Show you how these applications can take advantage of JavaFX’s latest user interface components, 3D technology, and cloud ...
Continue reading
This book constitutes the 14th edition of the annual Multi-Agent Programming Contest, MAPC 2019, and presents its participants. The ...
Continue reading
A guide and collection of ideas and time-proven concepts, the book highlight ways on how to accelerate a company, boost competitiveness, ...
Continue reading
In The Technology and Business of Mobile Telecommunications: An Introduction, a team of expert telecommunications researchers ...
Continue reading
Today’s mobile robot perception is insufficient for acting goal-directedly in unconstrained, dynamic everyday environments ...
Continue reading
Topics of interest include model driven architecture, enterprise development environments, service oriented architecture, ...
Continue reading
The volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
Continue reading
This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Continue reading
Constitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, ...
Continue reading
Interference determines the performance of UMTS radio networks. In order to provide good coverage and high capacity, network ...
Continue reading
Constitutes the refereed proceedings of the 7th International Conference on Ubiquitous Computing, UbiComp 2005, held in Japan ...
Continue reading
This book constitutes the refereed proceedings of the 8th International Conference on Ubiquitous Computing, UbiComp 2006. ...
Continue reading
This book is a collection of papers presented at UCS 2004, held on November 8-9 in Tokyo. The submitted papers presented ...
Continue reading
This book constitutes the refereed proceedings of the proceedings of the 2006 International Symposium on Ubiquitous Computing ...
Continue reading
Over recent years most business processes have changed in various dimensions (e. g. , ?exibility, interconnectivity, coordination ...
Continue reading
This book brings together the technological and business aspects of conducting commerce using ubiquitous and pervasive computing ...
Continue reading
Provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
Continue reading
A practical, no-nonsense guide to digital marketing, giving readers all the information they need to feel confident engaging ...
Continue reading
Covers the basic materials and up-to-date information to understand IPv6, including site local address often overlooked by ...
Continue reading
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...
Continue reading