Electronic Books

Total Books: 181 - 200 /308
Pervasive Computing

This book constitutes the refereed proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE 2007, ...

Lee mas
Pervasive Computing (vol. # 3468)

WelcometotheproceedingsofPervasive2005,The3rdInternationalConference on Pervasive Computing. We were honored to serve as ...

Lee mas
Pervasive Computing (vol. # 3968)

This book constitutes the refereed proceedings of the 4th International Conference on Pervasive Computing, PERVASIVE 2006, ...

Lee mas
Pervasive Computing : 6th International Conference, Pervasive 2008 Sydney, Australia, May 19-22, 2008 Proceedings

This book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...

Lee mas
Policies and Research in Identity Management : First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Lee mas
Portfolio Strategies of Private Equity Firms

Ulrich Lossen explores the choice of portfolio strategies by private equity firms and the impact of this choice on funds’ ...

Lee mas
Portfolios of Real Options

This book develops a modeling approach for dynamic investment problems where limited resources are allocated to interacting ...

Lee mas
Preserving Privacy in On-Line Analytical Processing (OLAP)

Preserving Privacy in On-Line Analytical Processing reviews a series of methods that can precisely answer data cube-style ...

Lee mas
Principles of Security and Trust

This book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...

Lee mas
Principles of Security and Trust

This volume contains the papers presented at POST 2018, the 7th Conference on Principles of Security and Trust, held April ...

Lee mas
Privacy Enhancing Technologies

This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...

Lee mas
Privacy Enhancing Technologies (vol. # 3424)

Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either ...

Lee mas
Privacy Enhancing Technologies (vol. # 3856)

The papers in this volume represent the proceedings of the 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June ...

Lee mas
Privacy Enhancing Technologies (vol. # 4258)

The papers in this volume represent the proceedings of The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was ...

Lee mas
Privacy Enhancing Technologies : 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings

Constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...

Lee mas
Privacy Preserving Data Mining

Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns ...

Lee mas
Privacy and Data Protection in Software Services

The aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal ...

Lee mas
Privacy and Technologies of Identity

Privacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological ...

Lee mas
Privacy in Statistical Databases

Privacy in statistical databases is a discipline whose purpose is to provide - lutions to the con?ict between the increasing ...

Lee mas
Privacy in Statistical Databases : UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings

Constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2008, held ...

Lee mas
Total Books: 181 - 200 /308