This book is the refereed proceedings of the Third International Conference on Ubiquitous Intelligence and Computing, UIC ...
Lire la suite
This book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Intelligence and Computing ...
Lire la suite
The book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
Lire la suite
Over recent years most business processes have changed in various dimensions (e. g. , ?exibility, interconnectivity, coordination ...
Lire la suite
This book brings together the technological and business aspects of conducting commerce using ubiquitous and pervasive computing ...
Lire la suite
The needs of future digital data and computer systems are expected to be two to three orders of magnitude larger than for ...
Lire la suiteThis project aims to develop a novel method for recognizing the shape of an object located behind thin medium utilizing combination ...
Lire la suite
The present volume represents the first comprehensive compilation of state-of-the-art research approaches to uncertainty ...
Lire la suite
This book reports on methods and technologies to describe, evaluate and control uncertainty in mechanical engineering applications. ...
Lire la suite
This book is about Rational Agents, which can be humans, players in a game, software programs or institutions. Typically, ...
Lire la suite
This volume provides a comprehensive view of unconstrained face recognition, especially face recognition from multiple still ...
Lire la suite
This book constitutes the refereed proceedings of the Sixth International Conference on Unconventional Computation, UC 2007,organized ...
Lire la suite
The Fourth International Conference on Unconventional Computation, UC 2005, organized under the auspices of EATCS by the ...
Lire la suite
This book about The 5th International Conference on Unconventional Computation, UC 2006,organized under the auspices of the ...
Lire la suite
The book is devoted to all aspects of unconventional computation ranging from theoretical and experimental aspects to various ...
Lire la suite
Nowadays, developers have to face the proliferation of hardware and software environments, the increasing demands of the ...
Lire la suite
Many animators and designers would like to supplement their Maya learning with a less-technical, more helpful book. This ...
Lire la suiteDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
Lire la suite
Covers the basic materials and up-to-date information to understand IPv6, including site local address often overlooked by ...
Lire la suite
This book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
Lire la suite