This textbook is written for all those wishing to understand the concepts behind modern optical recording. It also paves ...
Continue readingOptical Networking Standards: A Comprehensive Guide for Professionals provides a single source reference of over a hundred ...
Continue readingThis book discusses the energy management for the multi-energy maritime grid, which is the local energy network installed ...
Continue readingThis book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...
Continue readingPower Electronics in Smart Electrical Energy Networks introduces a new viewpoint on power electronics, re-thinking the basic ...
Continue readingThis book constitutes the refereed proceedings of the 7th International Conference on Practical Aspects of Knowledge Management, ...
Continue readingConstitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
Continue readingConstitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2008, held ...
Continue readingPrivacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...
Continue readingApplication Express, or APEX, is one of the most innovative products to come out of Oracle in years. APEX is an application ...
Continue readingBeginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand ...
Continue readingThis book is organized in topical sections on data mining and knowledge discovery, wireless, sensor networks and grid, XML ...
Continue readingThis book is organized in topical sections on provenance: models and querying; provenance: visualization, failures, identity; ...
Continue readingThis book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Continue readingPoor data quality can hinder or seriously damage the efficiency and effectiveness of organizations and businesses. The growing ...
Continue readingThis book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...
Continue readingThe book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
Continue readingThis book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...
Continue readingAlthough a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
Continue readingThis book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
Continue reading