Private equity has become an important asset class for institutional investors. As the asset class grows and investors get ...
اقرأ المزيد
LEGAL PROGRAMMING: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond provides ...
اقرأ المزيد
These proceedings contain the papers presented at the 3rd International S- posium on Location- and Context-Awareness in September ...
اقرأ المزيد
nd These proceedings contain the papers presented at the 2 International Workshop on Location- and Context-Awareness in May ...
اقرأ المزيد
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
اقرأ المزيد
The book deals with the management of information systems security and privacy, based on a model that covers technological, ...
اقرأ المزيد
Today, middleware is a key part of almost any application. Gone are the days when middleware was only used in the IT industry ...
اقرأ المزيد
This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...
اقرأ المزيد
This book contains the proceedings of the second IFIP TC8 Working Conference on Mobile Information Systems which was held ...
اقرأ المزيد
Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless ...
اقرأ المزيد
This book assesses this research frontier from a computer science perspective, investigating the various scientific and technological ...
اقرأ المزيدThis book provides researchers and professionals with a foundational understanding of online privacy as well as insight into ...
اقرأ المزيد
This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality ...
اقرأ المزيد
The book begins with a quick introduction to RFID basics and then discusses the various elements of the topic, using applications ...
اقرأ المزيد
This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
اقرأ المزيد
Neuroimmunology of Sleep provides an introduction to the interphase between sleep and neuroimmunology. Written both from ...
اقرأ المزيد
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيد
The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
اقرأ المزيد
The intent of this book is to address these issues and to serve as a handbook of IFIP's TC9 "Computers and Society" committee. ...
اقرأ المزيدThis book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by ...
اقرأ المزيد