This volume of the Lecture Notes in Computer Science series publishes the set of papers accepted for the ICQT 2006 workshop, ...
Continue reading
GERAD :The Center was created in 1980 by a small group of professors and researchers of HEC Montreal, GERAD's activities ...
Continue reading
This book constitutes the refereed proceedings of the SPEC International Performance Evaluation Workshop, SIPEW 2008, held ...
Continue reading
The intent of this book is to address these issues and to serve as a handbook of IFIP's TC9 "Computers and Society" committee. ...
Continue reading
today it’s well within your grasp, thanks to Podcasting using only some simple recording equipment, a computer, and the ...
Continue reading
This edited volume provides theoretical, practical, and historical perspectives on art and education in a post-digital, ...
Continue reading
New information technologies allow for the design of innovative electronic markets which can improve the efficiency of trading. ...
Continue reading
The Ajax craze is sweeping the world, and there is no shortage of libraries from which to choose to make it all easier to ...
Continue reading
Practical Internet Security, a professional book, reveals how the Internet is paving the way for secure communications within ...
Continue reading
Practical Pathology Informatics introduces and demystifies a variety of topics in the broad discipline of pathology informatics ...
Continue reading
Covers topics in e-government, discussing e-government's present shortcomings while exploring a renewed understanding of ...
Continue reading
Introduces the reader to the principles used in the construction of a large range of modern data communication protocols. ...
Continue reading
This volume contains the papers presented at POST 2018, the 7th Conference on Principles of Security and Trust, held April ...
Continue reading
This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...
Continue reading
Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either ...
Continue reading
There are a few class libraries recently distributed that open the Ajax door to the .NET Framework 2.0. This book examines ...
Continue reading
Pro JSF and Ajax shows you how to leverage the full potential of JavaServer Faces (JSF) and Ajax. This is not an entry-level ...
Continue reading
Pro LCS: Live Communications Server Administration will guide you on how to best leverage Microsofts Live Communications ...
Continue reading
Offers updated techniques and an evidence-based approach to the most common procedures performed at chairside. Ideal for ...
Continue reading
Describes the relationships of PLM with the Internet of Things, Industry 4.0, Digital Twins and Digital Threads. “Product ...
Continue reading