The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities ...
Continue readingThis tutorial book gives an overview of the current state of the art in measuring the different aspects of dependability ...
Continue readingThis book presented fault-tolerant algorithms, software engineering of dependable systems, networking and mobile computing, ...
Continue readingContains the proceedings of the 'Second Latin-American Symposium' on Dependable Computing, LADC 2005. This book comprises ...
Continue readingThis book presented fault-tolerant algorithms, software engineering of dependable systems, networking and mobile computing, ...
Continue readingIt is always a special honor to chair the European Dependable Computing C- ference (EDCC). EDCC has become one of the well-established ...
Continue readingThis book introduces readers to many new techniques for enhancing and optimizing reliability in embedded systems, which have ...
Continue readingThe present volume documents the results of a research program on Dependable Information and Communication Systems (DICS). ...
Continue readingWhether building a console application, a web service, or a smart client, you eventually need to distribute your finished ...
Continue readingRadio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data ...
Continue readingThis book showcases the state of the art in evolutionary algorithms for design. The chapters are organized by experts in ...
Continue readingDuring the last years, scientific computing has become an important research branch located between applied mathematics and ...
Continue readingSolving the problem of the various type of unknown attacks that are hitting not only companies but also high level business ...
Continue readingThe book brings in diverse perspectives on ubiquitous information environments, from computer-supported collaborative work, ...
Continue readingThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
Continue readingIn DevOps for Digital Leaders, deep collective experience on both sides of the dev–ops divide informs the global thought ...
Continue readingAs Ambient Intelligence (AmI) ecosystems are rapidly becoming a reality, they raise new research challenges. Unlike predefined ...
Continue readingConstitutes the refereed proceedings of the 9th International Conference on Developments in Language Theory, DLT 2005, held ...
Continue readingThis book constitutes the refereed proceedings of the 12th International Conference on Developments in Language Theory, DLT ...
Continue readingThe advent of the digital economy has the potential to dramatically change the conventional interrelationships among individuals, ...
Continue reading