Deep learning has been successfully applied to solve various complex problems ranging from big data analytics to computer ...
Continue readingThe book brings in diverse perspectives on ubiquitous information environments, from computer-supported collaborative work, ...
Continue readingThis book explores the global challenges and experiences related to digital entrepreneurial activities, using carefully selected ...
Continue readingIf you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers ...
Continue readingThe authors discuss the various body fluid specimens suitable for testing for illicit drugs describe the structural and manufacturing ...
Continue readingThis book constitutes the refereed proceedings of the 8th International Conference on E-Democracy, E-Democracy 2019, held ...
Continue readingBusiness organizations and governments are nowadays developing and providing internet based electronic services (e-services) ...
Continue readingThis book contains the proceedings of the First European Conference on Computer Network Defence which took place in December ...
Continue readingThis book is the first comprehensive exploration of the legal framework of EU digital copyright law from the perspective ...
Continue readingThis book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...
Continue readingThis book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...
Continue readingThis book introduces a taxonomy of electronic postage systems and explains their security risks and countermeasures. The ...
Continue readingThis book introduces a taxonomy of electronic postage systems and explains their security risks and countermeasures. The ...
Continue readingThis book constitutes the refereed proceedings of the International Conference on Emerging Trends in Information and Communication ...
Continue readingThis book takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence ...
Continue readingThis book takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence ...
Continue readingThis book provides in-depth analysis of the wide range of ethical issues associated with drug-resistant infectious diseases.
Continue readingIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
Continue readingIt addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...
Continue readingThis book presents the position that the online environment is a significant and relevant theater of activity in the fight ...
Continue reading