This book constitutes the refereed proceedings of the 7th International Conference on Ad-Hoc, Mobile, and Wireless Networks, ...
Lire la suiteThe QOS evaluating model for computational grid nodes put forward can help greatly improving the self-adaptability of resource ...
Lire la suiteAdvances in Communication Systems and Electrical Engineering compiles revised and extended articles written by prominent ...
Lire la suiteThis book address all aspects of grid and pervasive computing and focus on topics such as cluster computing, high performance ...
Lire la suiteThis book address all aspects of grid and pervasive computing and focus on topics such as cluster computing, high performance ...
Lire la suiteAs information technologies (IT) become specialized and fragmented, it is easy to lose sight that many topics in IT have ...
Lire la suiteAs information technologies (IT) become specialized and fragmented, it is easy to lose sight that many topics in IT have ...
Lire la suiteAdvances in Information Systems Development: Bridging the Gap between Academia and Industry, Volumes 1 and 2, are the collected ...
Lire la suiteThis book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ...
Lire la suiteAuthentication system has become a hot topic in the field of security, one of the most interested methods of authentication ...
Lire la suiteThis book will address issues related to business agility and the diffusion of Information Technology (IT). Success, even ...
Lire la suiteThis volume covers research trends as well as current achievements and cutting-edge developments in the area of modern business ...
Lire la suiteThis volume covers research trends as well as current achievements and cutting-edge developments in the area of modern business ...
Lire la suiteThe Symposia have become important, unique - casions in the international calendar of business research. The papers c- lected ...
Lire la suiteThe book constitutes a unique combination of in-depth insights into the counterfeit market, best-practice strategies, novel ...
Lire la suiteThese are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...
Lire la suiteThis book Is focusing on data semantics and infrastructure for information management and interchange, the papers are organized ...
Lire la suiteThis book Is focusing on data semantics and infrastructure for information management and interchange, the papers are organized ...
Lire la suiteRadio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data ...
Lire la suiteThe book brings in diverse perspectives on ubiquitous information environments, from computer-supported collaborative work, ...
Lire la suite