To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on se- manageable computing and communication ...
Weiterlesen
This book constitutes the refereed proceedings of the Third International Conference on Autonomic and Trusted Computing, ...
Weiterlesen
This book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC ...
Weiterlesen
MAS offiers powerful metaphors for information system conceptualization, a range of new techniques, and technologies specifically ...
Weiterlesen
MAS offiers powerful metaphors for information system conceptualization, a range of new techniques, and technologies specifically ...
Weiterlesen
If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability ...
Weiterlesen
You love it as the world's most popular desktop Linux distribution, and now Ubuntu is available at a server near you. Embracing ...
Weiterlesen
This book features various studies on democratization, transformation, socio-economic development, and security issues in ...
Weiterlesen
Combines experimental and theoretical research on big data recommender systems to help computer scientists develop new concepts ...
Weiterlesen
Combines experimental and theoretical research on big data recommender systems to help computer scientists develop new concepts ...
Weiterlesen
This book constitutes the proceedings of the 9th International Conference on Big Data, BigData 2020, held as part of SCF ...
Weiterlesen
Covers analytical techniques for handling the huge amount of data generated by the Internet of Things, from architectures ...
Weiterlesen
The main theme of this book is the relation between the global structure of Banach spaces and the various types of generalized ...
Weiterlesen
This book constitutes the refereed proceedings of the International Workshop on Biosurveillance and Biosecurity, BioSecure ...
Weiterlesen
Aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst ...
Weiterlesen
Blockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger ...
Weiterlesen
Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based ...
WeiterlesenFor cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security ...
Weiterlesen
Provides a structured, industry-independent and at the same time practical insight into all types of business partnerships. ...
Weiterlesen
A general architecture for service delivery and coordination in intelligent agent-based peer-to-peer (IP2P) environments, ...
Weiterlesen