The book explains the security architecture model and the practice of building data sharing from the blockchain infrastructure, ...
اقرأ المزيد
Blockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger ...
اقرأ المزيدPositioning objects has been an important topic since it’s needed to locate people, guide them to a certain place, and ...
اقرأ المزيد
While the problems of long-term stability and biocompatibility are being addressed, several promising prototypes are starting ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 21st IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE ...
اقرأ المزيد
Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based ...
اقرأ المزيد
Boundary representation is the principle solid modelling method used in modern CAD/CAM systems. There have been a long series ...
اقرأ المزيدHumans controlling machines with their minds may sound like something from a scifi movie, but it’s becoming a reality through ...
اقرأ المزيد
This book constitutes the refereed proceedings of the First International Symposium on Brain, Vision and Artificial Intelligence, ...
اقرأ المزيد
This WTEC study gathered information on worldwide status and trends in BCI research to disseminate to government decisionmakers ...
اقرأ المزيد
This book constitutes the refereed proceedings of IFIP TC6 Workshops on Broadband Satellite Communication Systems and Challenges ...
اقرأ المزيد
Lays out a vision for a coherent framework for understanding complex systems'' (from the foreword by J. Doyne Farmer). ...
اقرأ المزيد
This book provides foundational knowledge for designing autonomous, asynchronous systems and explains aspects of users relevant ...
اقرأ المزيدSpeaking on construction projects, we can imagine the huge amount of work, effort and time spent to complete any project. ...
اقرأ المزيد
This book clearly describes how to establish an architecture practice that delivers value for an organization. The authors ...
اقرأ المزيدThe project aims to build an automated exam for various exams, fields and institutions, and we have adopted in our project ...
اقرأ المزيدFor cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security ...
اقرأ المزيد
This book will address issues related to business agility and the diffusion of Information Technology (IT). Success, even ...
اقرأ المزيد
This volume covers research trends as well as current achievements and cutting-edge developments in the area of modern business ...
اقرأ المزيد