In this book Chakrabarti has structured the issues pertaining to grid computing security into three main categories: architecture-related, ...
Continue readingThe book provides: • Discussion of software engineering and modelling tools for the Grid • Analysis of issues inherent ...
Continue readingIn the third contribution, Altmann and colleagues formulate a taxonomical - proach to Grid business models. They survey the ...
Continue readingThis volume constitutes the refereed proceedings of the 5th International Workshop on Grid Economics and Business Models, ...
Continue readingThis book aims to strengthen and advance scientific and technological excellence in the area of Grid Computing. The main ...
Continue readingThis volume constitutes the proceedings of the 13th International Workshop on Groupware (CRIWG 2007). This workshop aims ...
Continue readingTopical sections include collaborative applications and group interaction, group awareness, computer supported collaborative ...
Continue readingThis book constitutes the refereed post-conference proceedings of the 14th International Workshop on Groupware: Design, Implementation, ...
Continue readingThis stimulating text/reference presents a philosophical exploration of the conceptual foundations of deep learning, presenting ...
Continue readingThe present book contains a collection of the best papers presented at the 5th International Conference on Interacción Persona ...
Continue readingBig Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, ...
Continue readingBig Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, ...
Continue readingThis Handbook presents a comprehensive and rigorous overview of the state-of-the-art on Smart Cities. It provides the reader ...
Continue readingDecision support systems have experienced a marked increase in attention and importance over the past 25 years. The aim of ...
Continue readingBegins with an overview of the technology landscape behind BERT. It takes you through the basics of NLP, including natural ...
Continue readingThis book constitutes the proceedings of the 12th International Conference on Human Haptic Sensing and Touch Enabled Computer ...
Continue reading“Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies ...
Continue readingHardening is the process of protecting a system against unknown threats. System administrators harden against that which ...
Continue readingThis book constitutes the refereed proceedings of the 10th International Conference on Software Reuse, ICSR 2008, held in ...
Continue readingThe objective of this symposium is to exchange the latest research results in software, architecture, and applications in ...
Continue reading