This book constitutes the refereed proceedings of the workshops of the First European Conference on Ambient Intelligence, ...
Continue readingHistory based access control and secure information flow The spec# programming system Mastering test generation from smart ...
Continue readingThis book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of ...
Continue readingThe purpose of this project is to design a platform that concentrates on Fashion in addition to assisting users with gathering ...
Continue readingEugen Lamers explains the principle of simulation speed-up in general, demonstrates the technique RESTART for the simulation ...
Continue readingThis book puts the larger vision of ubiquitous computing in the context of today’s mobile and distributed computing systems ...
Continue readingThis monograph presents a novel concept of a mobile robot, which is a single-wheel, gyroscopically stabilized robot. The ...
Continue readingThe central theme of the book is to build deeper understanding about incremental technological progress by introducing both ...
Continue readingCooperation in Wireless Networks: Principles and Applications covers the underlying principles of cooperative techniques ...
Continue readingThis carefully edited book presents how natural groupings such as fish schools, bird flocks, deer herds etc. coordinate themselves ...
Continue readingOnline collaboration is fast becoming a permanent feature of the modern workplace. Companies and organizations are attracted ...
Continue readingMany communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access ...
Continue readingThis book constitutes the refereed proceedings of the 7th International Conference on Coordination Models and Languages, ...
Continue readingThe era of mobile technology opens the windows to the mobile apps. The websites are vanishing and the mobile phones are emerging. ...
Continue readingCreating Mobile Games: shows you how to create a basic game and make it a professional one (by adding a pro look-and-feel ...
Continue readingThis paper presents a comprehensive crime detection system that uses a combination of hardware and software to monitor homes ...
Continue readingThis volume is covering many topics in control theory and several different applications. The variety of their research is ...
Continue readingThis volume is covering many topics in control theory and several different applications. The variety of their research is ...
Continue readingThis book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...
Continue readingThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
Continue reading