This book brings together the technological and business aspects of conducting commerce using ubiquitous and pervasive computing ...
Lee masUltra-Low Power Wireless Technologies for Sensor Networks is written for academic and professional researchers designing ...
Lee masUltrahigh-speed optical transmission technology is a key technology for increasing the communication capacity. In optical ...
Lee masThis project aims to develop a novel method for recognizing the shape of an object located behind thin medium utilizing combination ...
Lee masThis book deals with uncertainty forecasting based on a fuzzy time series approach, including fuzzy random processes and ...
Lee masThe book is devoted to all aspects of unconventional computation ranging from theoretical and experimental aspects to various ...
Lee masProvides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
Lee masDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
Lee masThis book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...
Lee masThis monograph provides an overview of the everyday lives of undocumented migrants, thereby focusing on housing, employment, ...
Lee masThis volume contains selected transcripts from presentations given at the conference. Speakers include: Chris Adami, Kenneth ...
Lee masthis book is based on the fact that it is the usersâ judgments that is the final measure regarding usability and acceptance ...
Lee masThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Lee masMultimedia networking applications and, in particular, the transport of c- pressed video are expected to contribute signi?cantly ...
Lee masThis book constitutes the refereed proceedings of the 17th International Conference on Virtual Reality and Augmented Reality, ...
Lee masThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Lee masThe amount of digitized information available on the Internet, in digital libraries, and other forms of information systems ...
Lee masVargas-Quesada and Moya-Anegón propose a methodology for visualizing large scientific domains. They create science maps, ...
Lee masNetworked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
Lee masThis book is open access under a CC-BY license. This open access volume presents papers on vocational education, project-based ...
Lee mas