This book constitutes the thoroughly refereed post-workshop proceedings of the 5th International Workshop on Declarative ...
Continue readingCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Continue readingCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Continue readingCovering one of the most important subjects to our society today, cloud security, this editorial team delves into solutions ...
Continue readingIn this book defense and security related applications are increasingly being tackled by researchers and practioners using ...
Continue readingThis compact open access reference delves beyond popular concepts of educated consumers and an informed public by examining ...
Continue readingInformative, insightful, and accessible, this book is designed to enhance the capacity of graduate and undergraduate students, ...
Continue readingThe IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities ...
Continue readingThis concise manual offers best practice guidance on dental treatment of pediatric patients with special health care needs ...
Continue readingThis book presented fault-tolerant algorithms, software engineering of dependable systems, networking and mobile computing, ...
Continue readingContains the proceedings of the 'Second Latin-American Symposium' on Dependable Computing, LADC 2005. This book comprises ...
Continue readingThis book presented fault-tolerant algorithms, software engineering of dependable systems, networking and mobile computing, ...
Continue readingThis is the third volume of the new conference series Design Computing and Cognition (DCC) that takes over from and subsumes ...
Continue readingIdentifies methods and thought processes used by designers in order to start the process that eventually leads to a finished ...
Continue readingRadio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data ...
Continue readingDesign and Performance of 3G Wireless Networks and Wireless LANs is for wireless communication system engineers, network ...
Continue readingBased on ideas discussed within the framework of the 2016 International Conference on Typography and Visual Communication ...
Continue readingA set of original results in the ?eld of high-level design of logical control devices and systems is presented in this book
Continue readingDesign of Ultra Wideband Antenna Matching Networks: via Simplified Real Frequency Technique (SRFT) is the first of its kind ...
Continue readingThe Design, Automation and Test in Europe (DATE) conference celebrated in 2007 its tenth anniversary. This provides an excellent ...
Continue reading