Explores the concepts and techniques of IoT, AI, and blockchain. Also discussed is the possibility of applying blockchain ...
Continue readingGuerraoui and Rodrigues present an introductory description of fundamental reliable distributed programming abstractions ...
Continue readingThis two-volume set of LNAI 12274 and LNAI 12275 constitutes the refereed proceedings of the 13th International Conference ...
Continue readingThis two-volume set of LNAI 12274 and LNAI 12275 constitutes the refereed proceedings of the 13th International Conference ...
Continue readingProvides an introduction to anatomy, including periodontal tissues, the edentulous ridge, the mucosa at teeth and implants, ...
Continue readingThis three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Continue readingThis three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Continue readingThis two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
Continue readingWe are delighted to present the proceedings of the 8th IFIP/IEEE International Conference on Management of Multimedia Networks ...
Continue readingThis book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Mobile ...
Continue readingThis book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, ...
Continue readingReservation procedures constitute the core of many popular data transmission protocols. They consist of two steps: A request ...
Continue readingThis two-volume book constitutes the refereed proceedings of the Second International Conference on Multimedia Technology ...
Continue readingThis two-volume book constitutes the refereed proceedings of the Second International Conference on Multimedia Technology ...
Continue readingThis book constitutes the refereed proceedings of the Second IFIP-TC6 Netw- king Conference, Networking 2002. Networking ...
Continue readingThis book constitutes the refereed proceedings of the 7th International IFIP-TC6 Networking Conference, NETWORKING 2008, ...
Continue readingThe goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
Continue readingThis book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...
Continue readingPairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...
Continue reading