The management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...
Continue readingincludes high-quality research on various aspects of intelligent interactive multimedia technologies in healthcare services. ...
Continue readingIntroduction to Engineering Statistics and Six Sigma contains precise descriptions of all of the many related methods and ...
Continue readingINTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...
Continue readingConstitutes the refereed postproceedings of the 11th International Workshop on Job Scheduling Strategies for Parallel Processing, ...
Continue readingKnowledge Discovery from Legal Databases is the first text to describe data mining , techniques as they apply to law. Law ...
Continue readingThis volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 19th IFIP/IEEE ...
Continue readingMass immunization is the blitzkrieg of vaccination practice. It serves to rapidly protect populations, both because of the ...
Continue readingLearn all about designing, installing, configuring, and managing VMware Horizon, with a core focus on how to deliver virtual ...
Continue readingThe importance of demonstrating the value achieved from IT investments is long established in the Computer Science (CS) and ...
Continue readingToday, middleware is a key part of almost any application. Gone are the days when middleware was only used in the IT industry ...
Continue readingThis book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
Continue readingThis book explores the impact that professional volunteers have on the low resource countries they choose to spend time in. ...
Continue readingThis book introduces readers to the background and principles of mobile service computing. It discusses various aspects of ...
Continue readingMule 2: A Developer's Guide introduces the Mule 2.0 integration platform for developers of enterprise integration applications ...
Continue readingThe aim of the CEEMAS conference series is to provide a biennial forum for the presentation of multi-agent research and development ...
Continue reading1 Multiagent Engineering: A New Software Construction Paradigm Multiagent systems have a long academic tradition. They have ...
Continue readingThis book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
Continue readingDense FTTH Passive Optical Networks (PONs) is a cost efficient way to build fibre access, and international standards (G/E-PON) ...
Continue readingOn April 22, 1915, the German military released 150 tons of chlorine gas at Ypres, Belgium. Carried by a long-awaited wind, ...
Continue reading