Peer-to-peer (P2P) computing promises to o?er exciting new possibilities in d- tributed information processing and database ...
Lire la suiteThe P2P paradigm lends itself to constructing large-scale, complex, adaptive, autonomous and heterogeneous database and information ...
Lire la suiteCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Lire la suiteCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Lire la suiteThe benefits of reading this book are twofold. The first is an understanding of the stages of a new product development process ...
Lire la suiteTopics and features: Presents a curiosity-driven approach, posing questions to stimulate readers to design novel computational ...
Lire la suiteExamines and demonstrates state-of-the-art approaches for IoT and Machine Learning based biomedical and health related applications. ...
Lire la suiteIn this book defense and security related applications are increasingly being tackled by researchers and practioners using ...
Lire la suiteThis is the third volume of the new conference series Design Computing and Cognition (DCC) that takes over from and subsumes ...
Lire la suiteDemonstrates how to use drawing as a practical tool for formulating and working through design problems. While digital tools ...
Lire la suiteDesigned for Digital offers practical advice on digital transformation, with examples that include Amazon, BNY Mellon, DBS ...
Lire la suiteThis book could well be the most comprehensive collection to date of integrated ideas on the elicitation, representation, ...
Lire la suiteDesigning Human Interface in Speech Technology bridges a gap between the needs of the technical engineer and cognitive researchers ...
Lire la suiteIt is a diagram of clarification, containing hundreds of examples of work by those who favor the communication of information ...
Lire la suiteThe design of organizations has been an ongoing concern of management theory and practice over the past several decades. ...
Lire la suiteThe integration of analytic models into information systems provides the basis for developing intelligent decision support ...
Lire la suiteThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Lire la suiteThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Lire la suiteThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
Lire la suiteThis book consitutes the refereed proceedings of the First International Workshop on Machine Learning held in Sheffield, ...
Lire la suite