This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
WeiterlesenThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
WeiterlesenThe goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
WeiterlesenGathers selected, peer-reviewed original contributions presented at the International Conference on Computational Vision ...
WeiterlesenThe selected papers may be classified roughly in ten broad areas: ? Information systems development ? Distributed systems ...
WeiterlesenThe book consists of three important sections. Section I addresses how the new person-centered system will change the way ...
WeiterlesenThe intent of this book is to address these issues and to serve as a handbook of IFIP's TC9 "Computers and Society" committee. ...
WeiterlesenThis book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by ...
WeiterlesenThis book constitutes the refereed proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE 2007, ...
WeiterlesenWelcometotheproceedingsofPervasive2005,The3rdInternationalConference on Pervasive Computing. We were honored to serve as ...
WeiterlesenThis book constitutes the refereed proceedings of the 4th International Conference on Pervasive Computing, PERVASIVE 2006, ...
WeiterlesenThis book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...
WeiterlesenPlatform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security ...
WeiterlesenThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...