This book constitutes the refereed proceedings of the 10th International Workshop on Cooperative Information Agents, CIA ...
Continue readingIn today’s world of ubiquitously connected heterogeneous information systems and computing devices, the intelligent coordination ...
Continue readingIn today’s world of ubiquitously connected heterogeneous information systems and computing devices, the intelligent coordination ...
Continue readingThis book constitutes the refereed proceedings of the 12th International Workshop on Cooperative Information Agents, CIA ...
Continue readingThis book provides an insight in the basic understanding of cooperative systems as well as in theory, modeling, and applications ...
Continue readingMany communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access ...
Continue readingThis book constitutes the refereed proceedings of the 8th International Conference on Coordination Models and Languages, ...
Continue readingThis book constitutes the refereed proceedings of the 23rd IFIP WG 6.1 International Conference on Coordination Models and ...
Continue readingThis book constitutes the proceedings of the 22nd International Conference on Coordination Models and Languages, COORDINATION ...
Continue readingThis book constitutes the refereed post-workshop proceedings of the International Workshop on Coordination, Organization, ...
Continue readingThe book constitutes a unique combination of in-depth insights into the counterfeit market, best-practice strategies, novel ...
Continue readingThis practical and greatly expanded edition by media and public relations veteran Colin Doeg focuses on the communications ...
Continue readingThis book explores the emotional labour of crisis reporters in an original style that combines fictional and factual narrative. ...
Continue readingThis volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
Continue readingThis book explores the potential risks and vulnerabilities of the European electricity infrastructure, other infrastructures ...
Continue readingRSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...
Continue readingThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
Continue readingThe papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
Continue readingThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
Continue readingThis book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
Continue reading