This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 7th International Middleware Conference 2006, held ...
Lire la suiteThis book constitutes the refereed proceedings of the ACM/IFIP/USENIX 8th International Middleware Conference 2007, held ...
Lire la suiteThis book constitutes the refereed proceedings of the ACM/IFIP/USENIX 9th International Middleware Conference 2008, held ...
Lire la suiteThis book contains the proceedings of the second IFIP TC8 Working Conference on Mobile Information Systems which was held ...
Lire la suiteThis book constitutes the thoroughly refereed post-workshop proceedings of the First International Workshop on Motion in ...
Lire la suiteReservation procedures constitute the core of many popular data transmission protocols. They consist of two steps: A request ...
Lire la suiteComputers arechanging the way wethink. Of course,nearly all desk-workers have access to computers and use them to email their ...
Lire la suitePHP and the MySQL database are deservedly the most popular combination for creating dynamic websites. They're free, easy ...
Lire la suiteThis book explains why cognitive linguistics offers a plausible theoretical framework for a systematic and unified analysis ...
Lire la suiteBuild a Django content management system, blog, and social networking site with James Bennett as he introduces the popular ...
Lire la suitePreserving Digital Information presents an up-to-date description of its field, together with a solution for all technical ...
Lire la suiteThe papers in this volume represent the proceedings of The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was ...
Lire la suiteConstitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
Lire la suiteDrupal is one of the most popular content management systems in use today. With it, you can create a variety of community-driven ...
Lire la suiteThis book includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
Lire la suiteSocial Networks and the Semantic Web combines the concepts and the methods of two fields of investigation, which together ...
Lire la suite"This book constitutes the proceedings of thethe International Conference on Software Engineering (ICSE 2005) by leading ...
Lire la suiteThis book includes : graph-based methods, probabilistic and stochastic structural models for PR, image and video analysis, ...
Lire la suiteThe 12 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 23 submissions. The ...
Lire la suiteTerrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques ...
Lire la suite