The present volume documents the results of a research program on Dependable Information and Communication Systems (DICS). ...
اقرأ المزيد
Innovative Internet Applications.’ Much has changed since then: wireless network technologies have become a constantly ...
اقرأ المزيد
Innovative Internet Applications.’ Much has changed since then: wireless network technologies have become a constantly ...
اقرأ المزيد
Whether building a console application, a web service, or a smart client, you eventually need to distribute your finished ...
اقرأ المزيد
This is the second volume of the new conference series Design Computing and Cognition (DCC) that takes over from and subsumes ...
اقرأ المزيد
Design and Performance of 3G Wireless Networks and Wireless LANs is for wireless communication system engineers, network ...
اقرأ المزيد
This book showcases the state of the art in evolutionary algorithms for design. The chapters are organized by experts in ...
اقرأ المزيد
Design of Ultra Wideband Antenna Matching Networks: via Simplified Real Frequency Technique (SRFT) is the first of its kind ...
اقرأ المزيد
The Design, Automation and Test in Europe (DATE) conference celebrated in 2007 its tenth anniversary. This provides an excellent ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 9th International Conference on Design, User Experience, and Usability, ...
اقرأ المزيد
Designing Embedded Processors examines the many ways in which processor based systems are designed to allow low power devices. ...
اقرأ المزيدReaders will find: Illuminating case study material that highlights how change management methodologies, game theory, and ...
اقرأ المزيد
The area of smart homes is fast developing as an emergent area which attracts the synergy of several areas of science. This ...
اقرأ المزيد
The integration of analytic models into information systems provides the basis for developing intelligent decision support ...
اقرأ المزيد
This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
اقرأ المزيد
This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
اقرأ المزيد
This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيد
This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيد
This book consitutes the refereed proceedings of the First International Workshop on Machine Learning held in Sheffield, ...
اقرأ المزيد