This book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Continue readingThis book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Continue readingThis book constitutes the refereed proceedings of the First International Conference on Grid and Pervasive Computing, GPC ...
Continue readingThe autonomic communication paradigm has been defined mainly through the Autonomic Communications Forum (ACF) and particularly ...
Continue readingth This volume presents the proceedings of the 6 IEEE International Workshop on IP Operations and Management (IPOM 2006), ...
Continue readingThe new edition of this atlas integrates all significant advances made in the past 15 years in molecular pathology, tumor ...
Continue readingThe four-volume set LNCS 3991-3994 constitutes the refereed proceedings of the 6th International Conference on Computational ...
Continue readingInnovative Internet Applications.’ Much has changed since then: wireless network technologies have become a constantly ...
Continue readingInnovative Internet Applications.’ Much has changed since then: wireless network technologies have become a constantly ...
Continue readingThis study is about developing a secure, autoscaling military postponement e-service in Syria, that allows Syrian citizens ...
Continue readingThis book contains fields of e-business and telecommunication networks, including aspects related to security, wireless systems, ...
Continue readingThis book contains fields of e-business and telecommunication networks, including aspects related to security, wireless systems, ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue readingHighlights the very latest research output of several EU satellite-related projects and addresses many unresolved issues ...
Continue readingThis book is a practical guide to IPv6 addressing Unix and network administrators with experience in TCP/IP(v4) but not necessarily ...
Continue readingThis volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...
Continue readingThis volume of Lecture Notes in Computer Science contains all accepted papers th of the 5 International Conference on Innovative ...
Continue readingMobile Ad hoc NETworks (MANETs) has attracted great research interest in recent years. A Mobile Ad Hoc Network is a self-organizing ...
Continue readingThe beginning of the twenty-first century is characterized by global markets, and the mobility of people is becoming an important ...
Continue reading