This volume constitutes the refereed proceedings of the 5th International Workshop on Grid Economics and Business Models, ...
WeiterlesenThis book aims to strengthen and advance scientific and technological excellence in the area of Grid Computing. The main ...
WeiterlesenThis book constitutes the refereed post-conference proceedings of the 14th International Workshop on Groupware: Design, Implementation, ...
WeiterlesenThe Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, ...
WeiterlesenThis book constitutes the proceedings of the 12th International Conference on Human Haptic Sensing and Touch Enabled Computer ...
WeiterlesenThis book constitutes the refereed proceedings of the 15th International Conference on High-Performance Computing, HiPC 2008, ...
WeiterlesenThis book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on High Performance ...
WeiterlesenThis book is the final compendium of case studies emanated from “High-Performance Modelling and Simulation for Big Data ...
WeiterlesenThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
WeiterlesenThis book cover topics such as: e-health technology design; well-being technology; biomedical and health informatics; and ...
WeiterlesenConstitutes the refereed proceedings of the 8th IEEE Workshop on IP Operations and Management, IPOM 2008, held on Samos Island, ...
WeiterlesenThis book constitutes the refereed proceedings of the 7th International Conference on Information Management and Big Data, ...
WeiterlesenThis book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Information ...
WeiterlesenThe 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...
WeiterlesenThis volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...
WeiterlesenThis book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information ...
WeiterlesenThis book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
WeiterlesenThis book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in computer ...
WeiterlesenThis book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, ...
WeiterlesenThis book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, ...
Weiterlesen