This book constitutes the refereed proceedings of the Third International Workshop on Quality of Service in Multiservice ...
Lire la suiteThis book explores the dataspace paradigm as a best-effort approach to data management within data ecosystems. It establishes ...
Lire la suiteThis book presents the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took ...
Lire la suiteThis book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Lire la suiteThis book contains a selection of papers presented at a Symposium organized under the aegis of COST Telecommunications Action ...
Lire la suiteDistributed networks such as the Internet have altered the fundamental way a record is created, captured, accessed and managed ...
Lire la suiteThis book is organized in topical sections on digital preservation, social tagging, quatations and annotations, user studies ...
Lire la suiteRunning IPv6 explains how to install and operate the IPv6 protocol for Windows XP, Mac OS X, FreeBSD, Red Hat Linux, and ...
Lire la suiteThis volume presents several case studies highlighting the latest findings in Industry 4.0 projects utilizing S-BPM features. ...
Lire la suiteThis is the first book to present field studies on the application of subject-oriented business process management (S-BPM). ...
Lire la suiteThis book is segmented into four topical sections on foundations of computer science; computing by nature; networks, security, ...
Lire la suiteThis book is organized in topical sections on applied topic maps in industry and administration, visualisation and representation ...
Lire la suiteThis book constitutes the refereed proceedings of the 5th Annual Smart City 360° Summit, held in Braga, Portugal, in December ...
Lire la suiteThis volume represents the state of the art of research on scripting computer-supported collaborative learning and provides ...
Lire la suiteThis book trains the next generation of scientists representing different disciplines to leverage the data generated during ...
Lire la suiteUp to 28 billion devices will be connected to the Internet with only one third of them being computers, smartphones and tablets. ...
Lire la suiteWelcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
Lire la suiteTheme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network ...
Lire la suiteThis two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...
Lire la suiteThis two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...
Lire la suite