With the rapid development of information and network technologies and market requirements, new challenges in supply chain ...
Lire la suite
Written for the non-specialist seeking an authoritative but accessible overview of this interdisciplinary field, True Visions ...
Lire la suite
This book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised ...
Lire la suite
The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Lire la suite
The volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
Lire la suite
This book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...
Lire la suite
The book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
Lire la suite
This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Lire la suite
Trusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...
Lire la suite
Turbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...
Lire la suite
This book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...
Lire la suite
The book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
Lire la suite
This book brings together the technological and business aspects of conducting commerce using ubiquitous and pervasive computing ...
Lire la suite
Ultrasonic Nondestructive Evaluation Systems: Models and Measurements provides the latest information and techniques available ...
Lire la suite
This book about The 5th International Conference on Unconventional Computation, UC 2006,organized under the auspices of the ...
Lire la suite
Provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
Lire la suiteDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
Lire la suite
This book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
Lire la suite
This volume contains the proceedings of the last ERCIM “User Interfaces for All” Workshop. The work of the ERCIM WG UI4ALL ...
Lire la suite
Information Society for All (IS4ALL) is devoted to consolidating and codifying available knowledge of universal access in ...
Lire la suite