This book constitutes the refereed proceedings of the workshops of the First European Conference on Ambient Intelligence, ...
Continue readingThe role of the consumer has changed from seeking the most satisfaction from goods and services to reconciling consumption ...
Continue readingThis book collects together the most recent studies of music consumption, and new developments in music technology. It combines ...
Continue readingContent Delivery Networks enables the readers to understand the basics, to identify the underlying technology, to summarize ...
Continue readingThis book presents an overview and step-by-step explanation of process management. It starts with the individual participants’ ...
Continue readingThis book constitutes the refereed proceedings of the 5th International Conference on Cooperative Design, Visualization, ...
Continue readingThis book constitutes the refereed proceedings of the 12th International Workshop on Cooperative Information Agents, CIA ...
Continue readingThis book constitutes the refereed proceedings of the 23rd IFIP WG 6.1 International Conference on Coordination Models and ...
Continue readingThe book constitutes a unique combination of in-depth insights into the counterfeit market, best-practice strategies, novel ...
Continue readingCreating Flash Widgets with Flash CS4 and ActionScript 3.0 is an introduction to developing widgets for the Internet using ...
Continue readingRemote web-based experimentation, enabling students and researchers to access the laboratory anytime via the Internet, is ...
Continue readingThe book provides an explanation for the emergence of innovation and creativity in the music industry by retelling and interpreting ...
Continue readingThis book is dedicated to advancing research, development and implementation efforts focused on infrastructure protection.
Continue readingThis book is dedicated to advancing research, development and implementation efforts focused on infrastructure protection.
Continue readingCryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing ...
Continue readingA rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
Continue readingThis book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
Continue readingThe central purpose of this collection of essays is to make a creative addition to the debates surrounding the cultural heritage ...
Continue readingThis book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...
Continue readingTechnical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating ...
Continue reading