This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 7th International Middleware Conference 2006, held ...
Continue readingThis book constitutes the refereed proceedings of the ACM/IFIP/USENIX 8th International Middleware Conference 2007, held ...
Continue readingThis book constitutes the refereed proceedings of the ACM/IFIP/USENIX 9th International Middleware Conference 2008, held ...
Continue readingThis book contains the proceedings of the second IFIP TC8 Working Conference on Mobile Information Systems which was held ...
Continue readingThis book constitutes the thoroughly refereed post-workshop proceedings of the First International Workshop on Motion in ...
Continue readingReservation procedures constitute the core of many popular data transmission protocols. They consist of two steps: A request ...
Continue readingComputers arechanging the way wethink. Of course,nearly all desk-workers have access to computers and use them to email their ...
Continue readingPHP and the MySQL database are deservedly the most popular combination for creating dynamic websites. They're free, easy ...
Continue readingThis book explains why cognitive linguistics offers a plausible theoretical framework for a systematic and unified analysis ...
Continue readingBuild a Django content management system, blog, and social networking site with James Bennett as he introduces the popular ...
Continue readingPreserving Digital Information presents an up-to-date description of its field, together with a solution for all technical ...
Continue readingThe papers in this volume represent the proceedings of The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was ...
Continue readingConstitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
Continue readingDrupal is one of the most popular content management systems in use today. With it, you can create a variety of community-driven ...
Continue readingThis book includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
Continue readingSocial Networks and the Semantic Web combines the concepts and the methods of two fields of investigation, which together ...
Continue reading"This book constitutes the proceedings of thethe International Conference on Software Engineering (ICSE 2005) by leading ...
Continue readingThis book includes : graph-based methods, probabilistic and stochastic structural models for PR, image and video analysis, ...
Continue readingThe 12 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 23 submissions. The ...
Continue readingTerrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques ...
Continue reading