This book is the refereed proceedings of the Third International Conference on Ubiquitous Intelligence and Computing, UIC ...
Weiterlesen
This book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Intelligence and Computing ...
Weiterlesen
The book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
Weiterlesen
Over recent years most business processes have changed in various dimensions (e. g. , ?exibility, interconnectivity, coordination ...
Weiterlesen
This book brings together the technological and business aspects of conducting commerce using ubiquitous and pervasive computing ...
Weiterlesen
The needs of future digital data and computer systems are expected to be two to three orders of magnitude larger than for ...
WeiterlesenThis project aims to develop a novel method for recognizing the shape of an object located behind thin medium utilizing combination ...
Weiterlesen
The present volume represents the first comprehensive compilation of state-of-the-art research approaches to uncertainty ...
Weiterlesen
This book reports on methods and technologies to describe, evaluate and control uncertainty in mechanical engineering applications. ...
Weiterlesen
This book is about Rational Agents, which can be humans, players in a game, software programs or institutions. Typically, ...
Weiterlesen
This volume provides a comprehensive view of unconstrained face recognition, especially face recognition from multiple still ...
Weiterlesen
This book constitutes the refereed proceedings of the Sixth International Conference on Unconventional Computation, UC 2007,organized ...
Weiterlesen
The Fourth International Conference on Unconventional Computation, UC 2005, organized under the auspices of EATCS by the ...
Weiterlesen
This book about The 5th International Conference on Unconventional Computation, UC 2006,organized under the auspices of the ...
Weiterlesen
The book is devoted to all aspects of unconventional computation ranging from theoretical and experimental aspects to various ...
Weiterlesen
Nowadays, developers have to face the proliferation of hardware and software environments, the increasing demands of the ...
Weiterlesen
Many animators and designers would like to supplement their Maya learning with a less-technical, more helpful book. This ...
WeiterlesenDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
Weiterlesen
Covers the basic materials and up-to-date information to understand IPv6, including site local address often overlooked by ...
Weiterlesen
This book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
Weiterlesen