Electronic Books

Total Books: 1261 - 1280 /1354
Transactions on Computational Systems Biology X

The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...

Lire la suite
Transactions on Data Hiding and Multimedia Security I

This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...

Lire la suite
Transactions on Data Hiding and Multimedia Security II

This second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...

Lire la suite
Transactions on Data Hiding and Multimedia Security III

The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...

Lire la suite
Transient Analysis of Electric Power Circuits Handbook

Every now and then, a good book comes along and quite rightfully makes itself a distinguished place amongthe existing books ...

Lire la suite
Transmedial Narration : Narratives and Stories in Different Media

including our own. By reconstructing the theoretical framework of transmedial narration, this book enables the inclusion ...

Lire la suite
True Visions

Written for the non-specialist seeking an authoritative but accessible overview of this interdisciplinary field, True Visions ...

Lire la suite
Trust Management II : Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway

The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...

Lire la suite
Trust in Agent Societies : 11th International Workshop, TRUST 2008, Estoril, Portugal, May 12 -13, 2008. Revised Selected and Invited Papers

The volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...

Lire la suite
Trust, Privacy and Security in Digital Business

This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...

Lire la suite
Trust, Privacy and Security in Digital Business : 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings

The book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...

Lire la suite
Trust, Privacy, and Security in Digital Business

“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...

Lire la suite
Trusted Computing - Challenges and Applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings

This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...

Lire la suite
Trustworthy Global Computing : Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers

The book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...

Lire la suite
Turbo Code Applications

Turbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...

Lire la suite
Tutorials in Mathematical Biosciences II

This book presents a series of models in the general area of cell physiology and signal transduction, with particular attention ...

Lire la suite
NoIMG
Twitter als Basis wissenschaftlicher Studien : Eine Bewertung gängiger Erhebungs- und Analysemethoden der Twitter-Forschung = Twitter as a basis for scientific studies: an evaluation of common survey and analysis methods in Twitter research

Fabian Pfaffenberger evaluates the scientific usefulness of Twitter by considering several common survey and analysis methods. ...

Lire la suite
UMTS Radio Network Planning: Mastering Cell Coupling for Capacity Optimization

Interference determines the performance of UMTS radio networks. In order to provide good coverage and high capacity, network ...

Lire la suite
UbiComp 2005: Ubiquitous Computing

Constitutes the refereed proceedings of the 7th International Conference on Ubiquitous Computing, UbiComp 2005, held in Japan ...

Lire la suite
UbiComp 2006: Ubiquitous Computing

This book constitutes the refereed proceedings of the 8th International Conference on Ubiquitous Computing, UbiComp 2006. ...

Lire la suite
Total Books: 1261 - 1280 /1354