This volume of the Lecture Notes in Computer Science series publishes the set of papers accepted for the ICQT 2006 workshop, ...
Continue readingGERAD :The Center was created in 1980 by a small group of professors and researchers of HEC Montreal, GERAD's activities ...
Continue readingThis book constitutes the refereed proceedings of the SPEC International Performance Evaluation Workshop, SIPEW 2008, held ...
Continue readingThe intent of this book is to address these issues and to serve as a handbook of IFIP's TC9 "Computers and Society" committee. ...
Continue readingtoday it’s well within your grasp, thanks to Podcasting using only some simple recording equipment, a computer, and the ...
Continue readingThis edited volume provides theoretical, practical, and historical perspectives on art and education in a post-digital, ...
Continue readingNew information technologies allow for the design of innovative electronic markets which can improve the efficiency of trading. ...
Continue readingThe Ajax craze is sweeping the world, and there is no shortage of libraries from which to choose to make it all easier to ...
Continue readingPractical Internet Security, a professional book, reveals how the Internet is paving the way for secure communications within ...
Continue readingPractical Pathology Informatics introduces and demystifies a variety of topics in the broad discipline of pathology informatics ...
Continue readingCovers topics in e-government, discussing e-government's present shortcomings while exploring a renewed understanding of ...
Continue readingIntroduces the reader to the principles used in the construction of a large range of modern data communication protocols. ...
Continue readingThis volume contains the papers presented at POST 2018, the 7th Conference on Principles of Security and Trust, held April ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...
Continue readingTraditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either ...
Continue readingThere are a few class libraries recently distributed that open the Ajax door to the .NET Framework 2.0. This book examines ...
Continue readingPro JSF and Ajax shows you how to leverage the full potential of JavaServer Faces (JSF) and Ajax. This is not an entry-level ...
Continue readingPro LCS: Live Communications Server Administration will guide you on how to best leverage Microsofts Live Communications ...
Continue readingOffers updated techniques and an evidence-based approach to the most common procedures performed at chairside. Ideal for ...
Continue readingDescribes the relationships of PLM with the Internet of Things, Industry 4.0, Digital Twins and Digital Threads. “Product ...
Continue reading