The management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...
Weiterlesenincludes high-quality research on various aspects of intelligent interactive multimedia technologies in healthcare services. ...
WeiterlesenIntroduction to Engineering Statistics and Six Sigma contains precise descriptions of all of the many related methods and ...
WeiterlesenINTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...
WeiterlesenConstitutes the refereed postproceedings of the 11th International Workshop on Job Scheduling Strategies for Parallel Processing, ...
WeiterlesenKnowledge Discovery from Legal Databases is the first text to describe data mining , techniques as they apply to law. Law ...
WeiterlesenThis volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 19th IFIP/IEEE ...
WeiterlesenMass immunization is the blitzkrieg of vaccination practice. It serves to rapidly protect populations, both because of the ...
WeiterlesenLearn all about designing, installing, configuring, and managing VMware Horizon, with a core focus on how to deliver virtual ...
WeiterlesenThe importance of demonstrating the value achieved from IT investments is long established in the Computer Science (CS) and ...
WeiterlesenToday, middleware is a key part of almost any application. Gone are the days when middleware was only used in the IT industry ...
WeiterlesenThis book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
WeiterlesenThis book explores the impact that professional volunteers have on the low resource countries they choose to spend time in. ...
WeiterlesenThis book introduces readers to the background and principles of mobile service computing. It discusses various aspects of ...
WeiterlesenMule 2: A Developer's Guide introduces the Mule 2.0 integration platform for developers of enterprise integration applications ...
WeiterlesenThe aim of the CEEMAS conference series is to provide a biennial forum for the presentation of multi-agent research and development ...
Weiterlesen1 Multiagent Engineering: A New Software Construction Paradigm Multiagent systems have a long academic tradition. They have ...
WeiterlesenThis book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
WeiterlesenDense FTTH Passive Optical Networks (PONs) is a cost efficient way to build fibre access, and international standards (G/E-PON) ...
WeiterlesenOn April 22, 1915, the German military released 150 tons of chlorine gas at Ypres, Belgium. Carried by a long-awaited wind, ...
Weiterlesen