The management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...
Lire la suiteincludes high-quality research on various aspects of intelligent interactive multimedia technologies in healthcare services. ...
Lire la suiteIntroduction to Engineering Statistics and Six Sigma contains precise descriptions of all of the many related methods and ...
Lire la suiteINTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...
Lire la suiteConstitutes the refereed postproceedings of the 11th International Workshop on Job Scheduling Strategies for Parallel Processing, ...
Lire la suiteKnowledge Discovery from Legal Databases is the first text to describe data mining , techniques as they apply to law. Law ...
Lire la suiteThis volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 19th IFIP/IEEE ...
Lire la suiteMass immunization is the blitzkrieg of vaccination practice. It serves to rapidly protect populations, both because of the ...
Lire la suiteLearn all about designing, installing, configuring, and managing VMware Horizon, with a core focus on how to deliver virtual ...
Lire la suiteThe importance of demonstrating the value achieved from IT investments is long established in the Computer Science (CS) and ...
Lire la suiteToday, middleware is a key part of almost any application. Gone are the days when middleware was only used in the IT industry ...
Lire la suiteThis book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
Lire la suiteThis book explores the impact that professional volunteers have on the low resource countries they choose to spend time in. ...
Lire la suiteThis book introduces readers to the background and principles of mobile service computing. It discusses various aspects of ...
Lire la suiteMule 2: A Developer's Guide introduces the Mule 2.0 integration platform for developers of enterprise integration applications ...
Lire la suiteThe aim of the CEEMAS conference series is to provide a biennial forum for the presentation of multi-agent research and development ...
Lire la suite1 Multiagent Engineering: A New Software Construction Paradigm Multiagent systems have a long academic tradition. They have ...
Lire la suiteThis book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
Lire la suiteDense FTTH Passive Optical Networks (PONs) is a cost efficient way to build fibre access, and international standards (G/E-PON) ...
Lire la suiteOn April 22, 1915, the German military released 150 tons of chlorine gas at Ypres, Belgium. Carried by a long-awaited wind, ...
Lire la suite