This book is the refereed proceedings of the Third International Conference on Ubiquitous Intelligence and Computing, UIC ...
Lire la suiteThis book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Intelligence and Computing ...
Lire la suiteThe book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
Lire la suiteOver recent years most business processes have changed in various dimensions (e. g. , ?exibility, interconnectivity, coordination ...
Lire la suiteThis book brings together the technological and business aspects of conducting commerce using ubiquitous and pervasive computing ...
Lire la suiteThe needs of future digital data and computer systems are expected to be two to three orders of magnitude larger than for ...
Lire la suiteThis project aims to develop a novel method for recognizing the shape of an object located behind thin medium utilizing combination ...
Lire la suiteThe present volume represents the first comprehensive compilation of state-of-the-art research approaches to uncertainty ...
Lire la suiteThis book reports on methods and technologies to describe, evaluate and control uncertainty in mechanical engineering applications. ...
Lire la suiteThis book is about Rational Agents, which can be humans, players in a game, software programs or institutions. Typically, ...
Lire la suiteThis volume provides a comprehensive view of unconstrained face recognition, especially face recognition from multiple still ...
Lire la suiteThis book constitutes the refereed proceedings of the Sixth International Conference on Unconventional Computation, UC 2007,organized ...
Lire la suiteThe Fourth International Conference on Unconventional Computation, UC 2005, organized under the auspices of EATCS by the ...
Lire la suiteThis book about The 5th International Conference on Unconventional Computation, UC 2006,organized under the auspices of the ...
Lire la suiteThe book is devoted to all aspects of unconventional computation ranging from theoretical and experimental aspects to various ...
Lire la suiteNowadays, developers have to face the proliferation of hardware and software environments, the increasing demands of the ...
Lire la suiteMany animators and designers would like to supplement their Maya learning with a less-technical, more helpful book. This ...
Lire la suiteDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
Lire la suiteCovers the basic materials and up-to-date information to understand IPv6, including site local address often overlooked by ...
Lire la suiteThis book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
Lire la suite