This comprehensive volume the inclusion of several case studies serves to examine pertinent topics, namely computer-based ...
Lire la suiteContent Delivery Networks enables the readers to understand the basics, to identify the underlying technology, to summarize ...
Lire la suiteThis book presents an overview and step-by-step explanation of process management. It starts with the individual participants’ ...
Lire la suiteIn August 2005, over 500 international researchers from the field of science education met at the 5th European Science Education ...
Lire la suiteEugen Lamers explains the principle of simulation speed-up in general, demonstrates the technique RESTART for the simulation ...
Lire la suiteThis book constitutes the refereed proceedings of the 5th International Conference on Cooperative Design, Visualization, ...
Lire la suiteThis book constitutes the refereed proceedings of the 10th International Workshop on Cooperative Information Agents, CIA ...
Lire la suiteIn today’s world of ubiquitously connected heterogeneous information systems and computing devices, the intelligent coordination ...
Lire la suiteIn today’s world of ubiquitously connected heterogeneous information systems and computing devices, the intelligent coordination ...
Lire la suiteThis book constitutes the refereed proceedings of the 12th International Workshop on Cooperative Information Agents, CIA ...
Lire la suiteMany communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access ...
Lire la suiteCorporate Performance Management (CPM) is a basic approach which examines the relationship between corporate performance ...
Lire la suiteDistributed client/server architectures are the technological backbone of today’s data centres. A usage-based allocation ...
Lire la suiteThe book constitutes a unique combination of in-depth insights into the counterfeit market, best-practice strategies, novel ...
Lire la suiteThis volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
Lire la suiteStarting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...
Lire la suiteStarting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...
Lire la suiteThis work takes stock of the different conceptions of fundamental value in finance, the methods of its calculation and the ...
Lire la suiteRSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...
Lire la suiteUnveils the biggest scams and frauds that have shocked the world of cryptocurrency, from the disappearing Crypto Queen with ...
Lire la suite