It contiants developments on all aspects of networking could be presented. It covered were diverse, with talks on strategies ...
Continue readingThe Internet is a massive global network of over 700 million users and it is addingusers at the rate of 300,000 per day. ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the Third Workshop on Combinatorial and Algorithmic Aspects ...
Continue readingThis book illustrates the benefits to be gained from digitally networked communication for health, education and transitioning ...
Continue readingillustrates the benefits to be gained from digitally networked communication for health, education and transitioning economies ...
Continue readingThis book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Computational ...
Continue readingThe two-volume set LNCS 5072 and 5073 constitutes the refereed proceedings of the International Conference on Computational ...
Continue readingThe two-volume set LNCS 5072 and 5073 constitutes the refereed proceedings of the International Conference on Computational ...
Continue readingThe two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer ...
Continue readingThe two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer ...
Continue readingThis volume presented automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical ...
Continue readingThis book constitutes thoroughly refereed post-conference proceedings of the 8th Asian Symposium on Computer Mathematics, ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the 4th International Computer Music Modeling ...
Continue readingThe text works its way from theapplication layer down toward the physical layer, motivating students by exposing them to ...
Continue readingThis book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...
Continue readingThis book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...
Continue readingThis book constitutes the refereed post-conference proceedings of the 15th CCF Conference on Computer Supported Cooperative ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Computer ...
Continue readingThe two-volume set LNCS 12376 and 12377 constitutes the refereed proceedings of the 17th International Conference on Computers ...
Continue reading