The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lire la suite
This book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...
Lire la suite
This useful volume provides up-to-date and state-of-the-art coverage of the diverse topics related to pervasive computing ...
Lire la suite
The 30 full papers and 11 short papers presented were carefully reviewed and selected from 102 submissions. The conference ...
Lire la suite
This book constitutes the thoroughly refereed proceedings of the 10th International Workshop on Principles, Systems and Applications ...
Lire la suite
Vast amounts of data are collected by service providers and system administ- tors, and are available in public information ...
Lire la suite
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lire la suite
This book constitutes the proceedings of the 29th European Symposium on Programming, ESOP 2020, which took place in Dublin, ...
Lire la suite
This book constitutes the proceedings of the 30th European Symposium on Programming, ESOP 2021, which was held during March ...
Lire la suiteThis book constitutes the proceedings of the 31st European Symposium on Programming, ESOP 2022, which was held during April ...
Lire la suite
The aim of the ProMAS workshop series is to promote and contribute to the establishment of MAS as a mainstream approach to ...
Lire la suite
Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand ...
Lire la suite
This book constitutes the refereed proceedings of the 20th EPIA Conference on Artificial Intelligence, EPIA 2021, held virtually ...
Lire la suite
The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Lire la suite
This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Lire la suite
The book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and ...
Lire la suite
This book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...
Lire la suite
This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Lire la suite
The idea of reconfigurable hardware systems has represented the Holy Grail for computer system designers.It has been recognized ...
Lire la suite
This book covers topics ranging from formal verification to real-time systems via concurrency, embedded systems, language ...
Lire la suite