Electronic Books

Total Books: 161 - 180 /274
Internet of Things, Artificial Intelligence and Blockchain Technology / R.Lakshmana Kumar, Yichuan Wang

Explores the concepts and techniques of IoT, AI, and blockchain. Also discussed is the possibility of applying blockchain ...

Lire la suite
Introduction to Reliable Distributed Programming

Guerraoui and Rodrigues present an introductory description of fundamental reliable distributed programming abstractions ...

Lire la suite
Knowledge Science, Engineering and Management

This two-volume set of LNAI 12274 and LNAI 12275 constitutes the refereed proceedings of the 13th International Conference ...

Lire la suite
Knowledge Science, Engineering and Management

This two-volume set of LNAI 12274 and LNAI 12275 constitutes the refereed proceedings of the 13th International Conference ...

Lire la suite
Lindhe's Clinical Periodontology and Implant Dentistry, 2 Volume Set, 7th Edition / Niklaus P. Lang, Tord Berglundh, William V. Giannobile, Mariano Sanz

Provides an introduction to anatomy, including periodontal tissues, the edentulous ridge, the mucosa at teeth and implants, ...

Lire la suite
Machine Learning for Cyber Security

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...

Lire la suite
Machine Learning for Cyber Security

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...

Lire la suite
Machine Learning, Image Processing, Network Security and Data Sciences

This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...

Lire la suite
Management of Multimedia Networks and Services

We are delighted to present the proceedings of the 8th IFIP/IEEE International Conference on Management of Multimedia Networks ...

Lire la suite
Mobile Ad-hoc and Sensor Networks (vol. # 4325)

This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...

Lire la suite
Mobile Computing, Applications, and Services

This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Mobile ...

Lire la suite
Mobile Wireless Middleware, Operating Systems and Applications

This book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, ...

Lire la suite
Multiaccess, Reservations & Queues

Reservation procedures constitute the core of many popular data transmission protocols. They consist of two steps: A request ...

Lire la suite
Multimedia Technology and Enhanced Learning

This two-volume book constitutes the refereed proceedings of the Second International Conference on Multimedia Technology ...

Lire la suite
Multimedia Technology and Enhanced Learning

This two-volume book constitutes the refereed proceedings of the Second International Conference on Multimedia Technology ...

Lire la suite
NETWORKING 2002: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications

This book constitutes the refereed proceedings of the Second IFIP-TC6 Netw- king Conference, Networking 2002. Networking ...

Lire la suite
NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet

This book constitutes the refereed proceedings of the 7th International IFIP-TC6 Networking Conference, NETWORKING 2008, ...

Lire la suite
New Stream Cipher Designs : The eSTREAM Finalists

The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...

Lire la suite
Pairing-Based Cryptography - Pairing 2008 : Second International Conference, Egham, UK, September 1-3, 2008. Proceedings

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...

Lire la suite
Pairing-Based Cryptography – Pairing 2007

Pairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...

Lire la suite
Total Books: 161 - 180 /274