This volume constitutes the refereed proceedings of the 5th International Workshop on Grid Economics and Business Models, ...
Continue readingThis book aims to strengthen and advance scientific and technological excellence in the area of Grid Computing. The main ...
Continue readingThis book constitutes the refereed post-conference proceedings of the 14th International Workshop on Groupware: Design, Implementation, ...
Continue readingThe Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, ...
Continue readingThis book constitutes the proceedings of the 12th International Conference on Human Haptic Sensing and Touch Enabled Computer ...
Continue readingThis book constitutes the refereed proceedings of the 15th International Conference on High-Performance Computing, HiPC 2008, ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on High Performance ...
Continue readingThis book is the final compendium of case studies emanated from “High-Performance Modelling and Simulation for Big Data ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue readingThis book cover topics such as: e-health technology design; well-being technology; biomedical and health informatics; and ...
Continue readingConstitutes the refereed proceedings of the 8th IEEE Workshop on IP Operations and Management, IPOM 2008, held on Samos Island, ...
Continue readingThis book constitutes the refereed proceedings of the 7th International Conference on Information Management and Big Data, ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Information ...
Continue readingThe 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...
Continue readingThis volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information ...
Continue readingThis book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
Continue readingThis book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in computer ...
Continue readingThis book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, ...
Continue readingThis book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, ...
Continue reading