Explores the concepts and techniques of IoT, AI, and blockchain. Also discussed is the possibility of applying blockchain ...
Lee masGuerraoui and Rodrigues present an introductory description of fundamental reliable distributed programming abstractions ...
Lee masThis two-volume set of LNAI 12274 and LNAI 12275 constitutes the refereed proceedings of the 13th International Conference ...
Lee masThis two-volume set of LNAI 12274 and LNAI 12275 constitutes the refereed proceedings of the 13th International Conference ...
Lee masProvides an introduction to anatomy, including periodontal tissues, the edentulous ridge, the mucosa at teeth and implants, ...
Lee masThis three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Lee masThis three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Lee masThis two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
Lee masWe are delighted to present the proceedings of the 8th IFIP/IEEE International Conference on Management of Multimedia Networks ...
Lee masThis book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
Lee masThis book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Mobile ...
Lee masThis book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, ...
Lee masReservation procedures constitute the core of many popular data transmission protocols. They consist of two steps: A request ...
Lee masThis two-volume book constitutes the refereed proceedings of the Second International Conference on Multimedia Technology ...
Lee masThis two-volume book constitutes the refereed proceedings of the Second International Conference on Multimedia Technology ...
Lee masThis book constitutes the refereed proceedings of the Second IFIP-TC6 Netw- king Conference, Networking 2002. Networking ...
Lee masThis book constitutes the refereed proceedings of the 7th International IFIP-TC6 Networking Conference, NETWORKING 2008, ...
Lee masThe goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
Lee masThis book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...
Lee masPairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...
Lee mas