This book assesses this research frontier from a computer science perspective, investigating the various scientific and technological ...
Continue readingThis book provides researchers and professionals with a foundational understanding of online privacy as well as insight into ...
Continue readingThis volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality ...
Continue readingThe book begins with a quick introduction to RFID basics and then discusses the various elements of the topic, using applications ...
Continue readingThis book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
Continue readingThe goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
Continue readingThe intent of this book is to address these issues and to serve as a handbook of IFIP's TC9 "Computers and Society" committee. ...
Continue readingThis book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by ...
Continue readingThis book constitutes the refereed proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE 2007, ...
Continue readingWelcometotheproceedingsofPervasive2005,The3rdInternationalConference on Pervasive Computing. We were honored to serve as ...
Continue readingThis book constitutes the refereed proceedings of the 4th International Conference on Pervasive Computing, PERVASIVE 2006, ...
Continue readingThis book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...