This book constitutes the refereed proceedings of the proceedings of the 2006 International Symposium on Ubiquitous Computing ...
اقرأ المزيدUbiquitous computing is already with us and is changing our lifestyle, way of thinking and quality of life. Everyday objects ...
اقرأ المزيدThe book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
اقرأ المزيدOver recent years most business processes have changed in various dimensions (e. g. , ?exibility, interconnectivity, coordination ...
اقرأ المزيدUltra-Low Power Wireless Technologies for Sensor Networks is written for academic and professional researchers designing ...
اقرأ المزيدThis book deals with uncertainty forecasting based on a fuzzy time series approach, including fuzzy random processes and ...
اقرأ المزيدThe book is devoted to all aspects of unconventional computation ranging from theoretical and experimental aspects to various ...
اقرأ المزيدDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
اقرأ المزيدThis book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...
اقرأ المزيدThis monograph provides an overview of the everyday lives of undocumented migrants, thereby focusing on housing, employment, ...
اقرأ المزيدThis volume contains selected transcripts from presentations given at the conference. Speakers include: Chris Adami, Kenneth ...
اقرأ المزيدthis book is based on the fact that it is the usersâ judgments that is the final measure regarding usability and acceptance ...
اقرأ المزيدThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 17th International Conference on Virtual Reality and Augmented Reality, ...
اقرأ المزيدThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
اقرأ المزيدThe amount of digitized information available on the Internet, in digital libraries, and other forms of information systems ...
اقرأ المزيدVargas-Quesada and Moya-Anegón propose a methodology for visualizing large scientific domains. They create science maps, ...
اقرأ المزيدNetworked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
اقرأ المزيدWith contributions from some of the most experienced and knowledgeable experts in the field, the book desbribes the state-of-the-art ...
اقرأ المزيدThis book presents a pathbreaking analysis of vote-buying in Indonesia. Drawing on a stunning array of evidence, Muhtadi ...
اقرأ المزيد