Explores the concepts and techniques of IoT, AI, and blockchain. Also discussed is the possibility of applying blockchain ...
Lire la suiteGuerraoui and Rodrigues present an introductory description of fundamental reliable distributed programming abstractions ...
Lire la suiteThis two-volume set of LNAI 12274 and LNAI 12275 constitutes the refereed proceedings of the 13th International Conference ...
Lire la suiteThis two-volume set of LNAI 12274 and LNAI 12275 constitutes the refereed proceedings of the 13th International Conference ...
Lire la suiteProvides an introduction to anatomy, including periodontal tissues, the edentulous ridge, the mucosa at teeth and implants, ...
Lire la suiteThis three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Lire la suiteThis three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Lire la suiteThis two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
Lire la suiteWe are delighted to present the proceedings of the 8th IFIP/IEEE International Conference on Management of Multimedia Networks ...
Lire la suiteThis book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
Lire la suiteThis book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Mobile ...
Lire la suiteThis book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, ...
Lire la suiteReservation procedures constitute the core of many popular data transmission protocols. They consist of two steps: A request ...
Lire la suiteThis two-volume book constitutes the refereed proceedings of the Second International Conference on Multimedia Technology ...
Lire la suiteThis two-volume book constitutes the refereed proceedings of the Second International Conference on Multimedia Technology ...
Lire la suiteThis book constitutes the refereed proceedings of the Second IFIP-TC6 Netw- king Conference, Networking 2002. Networking ...
Lire la suiteThis book constitutes the refereed proceedings of the 7th International IFIP-TC6 Networking Conference, NETWORKING 2008, ...
Lire la suiteThe goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
Lire la suiteThis book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, ...
Lire la suitePairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book ...
Lire la suite