Peer-to-peer (P2P) computing promises to o?er exciting new possibilities in d- tributed information processing and database ...
WeiterlesenThe P2P paradigm lends itself to constructing large-scale, complex, adaptive, autonomous and heterogeneous database and information ...
WeiterlesenCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
WeiterlesenCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
WeiterlesenThe benefits of reading this book are twofold. The first is an understanding of the stages of a new product development process ...
WeiterlesenTopics and features: Presents a curiosity-driven approach, posing questions to stimulate readers to design novel computational ...
WeiterlesenExamines and demonstrates state-of-the-art approaches for IoT and Machine Learning based biomedical and health related applications. ...
WeiterlesenIn this book defense and security related applications are increasingly being tackled by researchers and practioners using ...
WeiterlesenThis is the third volume of the new conference series Design Computing and Cognition (DCC) that takes over from and subsumes ...
WeiterlesenDemonstrates how to use drawing as a practical tool for formulating and working through design problems. While digital tools ...
WeiterlesenDesigned for Digital offers practical advice on digital transformation, with examples that include Amazon, BNY Mellon, DBS ...
WeiterlesenThis book could well be the most comprehensive collection to date of integrated ideas on the elicitation, representation, ...
WeiterlesenDesigning Human Interface in Speech Technology bridges a gap between the needs of the technical engineer and cognitive researchers ...
WeiterlesenIt is a diagram of clarification, containing hundreds of examples of work by those who favor the communication of information ...
WeiterlesenThe design of organizations has been an ongoing concern of management theory and practice over the past several decades. ...
WeiterlesenThe integration of analytic models into information systems provides the basis for developing intelligent decision support ...
WeiterlesenThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
WeiterlesenThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
WeiterlesenThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
WeiterlesenThis book consitutes the refereed proceedings of the First International Workshop on Machine Learning held in Sheffield, ...
Weiterlesen