Combinatorial optimization algorithms are used in many applications including the design, management, and operations of communication ...
Lee masDo small developing economies, or SDEs, need a specific competition policy to create competitive markets? Against the backdrop ...
Lee masWe are living in an ever more complex world, an epoch where human actions can accordingly acquire far-reaching potentialities. ...
Lee masProviding all the latest on a topic of extreme commercial relevance, this book contains new trends in global software services ...
Lee masProviding all the latest on a topic of extreme commercial relevance, this book contains new trends in global software services ...
Lee masThis book constitutes the refereed proceedings of the 11th International ACM SIGSOFT Symposium on Component-Based Software ...
Lee masComponent-based software development regards software construction in terms of conventional engineering disciplines where ...
Lee masThe three-volume set LNCS 5101-5103 constitutes the refereed proceedings of the 8th International Conference on Computational ...
Lee masThe three-volume set LNCS 5101-5103 constitutes the refereed proceedings of the 8th International Conference on Computational ...
Lee masThe three-volume set LNCS 5101-5103 constitutes the refereed proceedings of the 8th International Conference on Computational ...
Lee masThe two-volume set LNCS 5072 and 5073 constitutes the refereed proceedings of the International Conference on Computational ...
Lee masThe two-volume set LNCS 5072 and 5073 constitutes the refereed proceedings of the International Conference on Computational ...
Lee masThe two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer ...
Lee masComputer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances ...
Lee masThis book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
Lee masThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Lee masThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Lee masThis book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Computer ...
Lee masComputer-Aided Design of User Interfaces IV gathers the latest research of experts, research teams and leading organisations ...
Lee masThe International Conference on Conceptual Modeling provides the premiere - rum for presenting and discussing current research ...
Lee mas