Explores the concepts and techniques of IoT, AI, and blockchain. Also discussed is the possibility of applying blockchain ...
Continue reading
Guerraoui and Rodrigues present an introductory description of fundamental reliable distributed programming abstractions ...
Continue reading
This two-volume set of LNAI 12274 and LNAI 12275 constitutes the refereed proceedings of the 13th International Conference ...
Continue reading
This two-volume set of LNAI 12274 and LNAI 12275 constitutes the refereed proceedings of the 13th International Conference ...
Continue reading
Provides an introduction to anatomy, including periodontal tissues, the edentulous ridge, the mucosa at teeth and implants, ...
Continue reading
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Continue reading
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Continue reading
This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
Continue reading
We are delighted to present the proceedings of the 8th IFIP/IEEE International Conference on Management of Multimedia Networks ...
Continue reading
This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
Continue reading
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Mobile ...
Continue reading
This book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, ...
Continue reading
Reservation procedures constitute the core of many popular data transmission protocols. They consist of two steps: A request ...
Continue reading
This two-volume book constitutes the refereed proceedings of the Second International Conference on Multimedia Technology ...
Continue reading
This two-volume book constitutes the refereed proceedings of the Second International Conference on Multimedia Technology ...
Continue reading
This book constitutes the refereed proceedings of the Second IFIP-TC6 Netw- king Conference, Networking 2002. Networking ...
Continue reading
This book constitutes the refereed proceedings of the 7th International IFIP-TC6 Networking Conference, NETWORKING 2008, ...
Continue reading
The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
Continue reading
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...
Continue reading
Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...
Continue reading