This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
WeiterlesenThis book draws together carefully revised papers on trust, reputation, and security in agent society. Besides workshop papers, ...
WeiterlesenThe book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...
WeiterlesenThis book is an introduction to the multidisciplinary field of anomalous diffusion in complex systems, with emphasis on the ...
WeiterlesenIt is well established and appreciated by now that more than 99% of the baryonic matter in the universe is in the plasma ...
WeiterlesenThis book concerns footprints of the international environmental conventions in action. Hydropower projects have been selected ...
WeiterlesenEditor Kim Williams has assembled a group of notes where scholars contribute essays inspired by their contact with Prof David ...
WeiterlesenThis book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...
WeiterlesenThe book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
WeiterlesenOver recent years most business processes have changed in various dimensions (e. g. , ?exibility, interconnectivity, coordination ...
WeiterlesenThis book brings together the technological and business aspects of conducting commerce using ubiquitous and pervasive computing ...
WeiterlesenUltrafast Phenomena XV presents the latest advances in ultrafast science, including both ultrafast optical technology and ...
WeiterlesenUltrahigh-speed optical transmission technology is a key technology for increasing the communication capacity. In optical ...
WeiterlesenSources of ultrashort laser pulses are nowadays commercially available and have entered many areas of research and development. ...
WeiterlesenThis project aims to develop a novel method for recognizing the shape of an object located behind thin medium utilizing combination ...
WeiterlesenIn the introduction accelerator-based light sources are considered and a comparison is made between free-electron lasers ...
WeiterlesenThis book deals with uncertainty forecasting based on a fuzzy time series approach, including fuzzy random processes and ...
WeiterlesenThe present volume represents the first comprehensive compilation of state-of-the-art research approaches to uncertainty ...
WeiterlesenThis book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
WeiterlesenIn this edited open access book leading scholars from different disciplinary backgrounds wrestle with social science integration ...
Weiterlesen