Peer-to-peer (P2P) computing promises to o?er exciting new possibilities in d- tributed information processing and database ...
Lire la suite
The P2P paradigm lends itself to constructing large-scale, complex, adaptive, autonomous and heterogeneous database and information ...
Lire la suite
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Lire la suite
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Lire la suite
The benefits of reading this book are twofold. The first is an understanding of the stages of a new product development process ...
Lire la suite
Topics and features: Presents a curiosity-driven approach, posing questions to stimulate readers to design novel computational ...
Lire la suite
Examines and demonstrates state-of-the-art approaches for IoT and Machine Learning based biomedical and health related applications. ...
Lire la suite
In this book defense and security related applications are increasingly being tackled by researchers and practioners using ...
Lire la suite
This is the third volume of the new conference series Design Computing and Cognition (DCC) that takes over from and subsumes ...
Lire la suiteDemonstrates how to use drawing as a practical tool for formulating and working through design problems. While digital tools ...
Lire la suite
Designed for Digital offers practical advice on digital transformation, with examples that include Amazon, BNY Mellon, DBS ...
Lire la suite
This book could well be the most comprehensive collection to date of integrated ideas on the elicitation, representation, ...
Lire la suite
Designing Human Interface in Speech Technology bridges a gap between the needs of the technical engineer and cognitive researchers ...
Lire la suiteIt is a diagram of clarification, containing hundreds of examples of work by those who favor the communication of information ...
Lire la suite
The design of organizations has been an ongoing concern of management theory and practice over the past several decades. ...
Lire la suite
The integration of analytic models into information systems provides the basis for developing intelligent decision support ...
Lire la suite
This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Lire la suite
This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Lire la suite
This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
Lire la suite
This book consitutes the refereed proceedings of the First International Workshop on Machine Learning held in Sheffield, ...
Lire la suite