This textbook is written for all those wishing to understand the concepts behind modern optical recording. It also paves ...
Continue reading
Optical Networking Standards: A Comprehensive Guide for Professionals provides a single source reference of over a hundred ...
Continue reading
This book discusses the energy management for the multi-energy maritime grid, which is the local energy network installed ...
Continue reading
This book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...
Continue reading
Power Electronics in Smart Electrical Energy Networks introduces a new viewpoint on power electronics, re-thinking the basic ...
Continue reading
This book constitutes the refereed proceedings of the 7th International Conference on Practical Aspects of Knowledge Management, ...
Continue reading
Constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
Continue reading
Constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2008, held ...
Continue reading
Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...
Continue reading
Application Express, or APEX, is one of the most innovative products to come out of Oracle in years. APEX is an application ...
Continue reading
Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand ...
Continue reading
This book is organized in topical sections on data mining and knowledge discovery, wireless, sensor networks and grid, XML ...
Continue reading
This book is organized in topical sections on provenance: models and querying; provenance: visualization, failures, identity; ...
Continue reading
This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Continue reading
Poor data quality can hinder or seriously damage the efficiency and effectiveness of organizations and businesses. The growing ...
Continue reading
This book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...
Continue reading
The book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
Continue reading
This book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...
Continue reading
Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
Continue reading
This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
Continue reading