This book is the refereed proceedings of the Third International Conference on Ubiquitous Intelligence and Computing, UIC ...
Continue readingThis book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Intelligence and Computing ...
Continue readingThe book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
Continue readingOver recent years most business processes have changed in various dimensions (e. g. , ?exibility, interconnectivity, coordination ...
Continue readingThis book brings together the technological and business aspects of conducting commerce using ubiquitous and pervasive computing ...
Continue readingThe needs of future digital data and computer systems are expected to be two to three orders of magnitude larger than for ...
Continue readingThis project aims to develop a novel method for recognizing the shape of an object located behind thin medium utilizing combination ...
Continue readingThe present volume represents the first comprehensive compilation of state-of-the-art research approaches to uncertainty ...
Continue readingThis book reports on methods and technologies to describe, evaluate and control uncertainty in mechanical engineering applications. ...
Continue readingThis book is about Rational Agents, which can be humans, players in a game, software programs or institutions. Typically, ...
Continue readingThis volume provides a comprehensive view of unconstrained face recognition, especially face recognition from multiple still ...
Continue readingThis book constitutes the refereed proceedings of the Sixth International Conference on Unconventional Computation, UC 2007,organized ...
Continue readingThe Fourth International Conference on Unconventional Computation, UC 2005, organized under the auspices of EATCS by the ...
Continue readingThis book about The 5th International Conference on Unconventional Computation, UC 2006,organized under the auspices of the ...
Continue readingThe book is devoted to all aspects of unconventional computation ranging from theoretical and experimental aspects to various ...
Continue readingNowadays, developers have to face the proliferation of hardware and software environments, the increasing demands of the ...
Continue readingMany animators and designers would like to supplement their Maya learning with a less-technical, more helpful book. This ...
Continue readingDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
Continue readingCovers the basic materials and up-to-date information to understand IPv6, including site local address often overlooked by ...
Continue readingThis book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
Continue reading