This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...
Continue readingThis book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
Continue readingThis book summarizes knowledge about several file systems and file formats commonly used in mobile devices. In addition to ...
Continue readingThis book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, ...
Continue readingMobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless ...
Continue readingThis book assesses this research frontier from a computer science perspective, investigating the various scientific and technological ...
Continue reading"The book presents approaches and methodologies for predicting the structure and diversity of key aquatic communities (namely ...
Continue readingThis book constitutes the refereed proceedings of the Second International Conference MCO 2008, Metz, France, September 2008.The ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of 11 international workshops held as satellite events of ...
Continue readingThis volume is dedicated to the eminent Russian mathematician Igor Borisovich Simonenko on the occasion of his 70th birthday. ...
Continue readingThis book provides researchers and professionals with a foundational understanding of online privacy as well as insight into ...
Continue readingMolecular Mechanisms of Plant and Microbe Coexistence presents studies on the complex and manifold interactions of plants ...
Continue readingMolecular Processes in Plasmas describes elementary collision processes in plasmas, particularly those involving molecules ...
Continue readingMultimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...
Continue readingMedia forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share ...
Continue readingProvides an insight about various techniques used in multimedia security and identifies its progress in both technological ...
Continue readingOz's concurrency model yields simplicity and clarity (because Oz makes it easier to express complex programs with many interacting ...
Continue readingMultivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...
Continue readingThis book constitutes the refereed proceedings of the Second IFIP-TC6 Netw- king Conference, Networking 2002. Networking ...
Continue readingThis book surveys the state of the field to examine whether a fifth wave of deterrence theory is emerging. Bringing together ...
Continue reading