This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 7th International Middleware Conference 2006, held ...
Continue reading
This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 8th International Middleware Conference 2007, held ...
Continue reading
This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 9th International Middleware Conference 2008, held ...
Continue reading
This book contains the proceedings of the second IFIP TC8 Working Conference on Mobile Information Systems which was held ...
Continue reading
This book constitutes the thoroughly refereed post-workshop proceedings of the First International Workshop on Motion in ...
Continue reading
Reservation procedures constitute the core of many popular data transmission protocols. They consist of two steps: A request ...
Continue reading
Computers arechanging the way wethink. Of course,nearly all desk-workers have access to computers and use them to email their ...
Continue reading
PHP and the MySQL database are deservedly the most popular combination for creating dynamic websites. They're free, easy ...
Continue reading
This book explains why cognitive linguistics offers a plausible theoretical framework for a systematic and unified analysis ...
Continue reading
Build a Django content management system, blog, and social networking site with James Bennett as he introduces the popular ...
Continue reading
Preserving Digital Information presents an up-to-date description of its field, together with a solution for all technical ...
Continue reading
The papers in this volume represent the proceedings of The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was ...
Continue reading
Constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
Continue reading
Drupal is one of the most popular content management systems in use today. With it, you can create a variety of community-driven ...
Continue reading
This book includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
Continue reading
Social Networks and the Semantic Web combines the concepts and the methods of two fields of investigation, which together ...
Continue reading
"This book constitutes the proceedings of thethe International Conference on Software Engineering (ICSE 2005) by leading ...
Continue reading
This book includes : graph-based methods, probabilistic and stochastic structural models for PR, image and video analysis, ...
Continue reading
The 12 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 23 submissions. The ...
Continue reading
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques ...
Continue reading