This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Lire la suiteThis book draws together carefully revised papers on trust, reputation, and security in agent society. Besides workshop papers, ...
Lire la suiteThe book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...
Lire la suiteThis book is an introduction to the multidisciplinary field of anomalous diffusion in complex systems, with emphasis on the ...
Lire la suiteIt is well established and appreciated by now that more than 99% of the baryonic matter in the universe is in the plasma ...
Lire la suiteThis book concerns footprints of the international environmental conventions in action. Hydropower projects have been selected ...
Lire la suiteEditor Kim Williams has assembled a group of notes where scholars contribute essays inspired by their contact with Prof David ...
Lire la suiteThis book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...
Lire la suiteThe book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
Lire la suiteOver recent years most business processes have changed in various dimensions (e. g. , ?exibility, interconnectivity, coordination ...
Lire la suiteThis book brings together the technological and business aspects of conducting commerce using ubiquitous and pervasive computing ...
Lire la suiteUltrafast Phenomena XV presents the latest advances in ultrafast science, including both ultrafast optical technology and ...
Lire la suiteUltrahigh-speed optical transmission technology is a key technology for increasing the communication capacity. In optical ...
Lire la suiteSources of ultrashort laser pulses are nowadays commercially available and have entered many areas of research and development. ...
Lire la suiteThis project aims to develop a novel method for recognizing the shape of an object located behind thin medium utilizing combination ...
Lire la suiteIn the introduction accelerator-based light sources are considered and a comparison is made between free-electron lasers ...
Lire la suiteThis book deals with uncertainty forecasting based on a fuzzy time series approach, including fuzzy random processes and ...
Lire la suiteThe present volume represents the first comprehensive compilation of state-of-the-art research approaches to uncertainty ...
Lire la suiteThis book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
Lire la suiteIn this edited open access book leading scholars from different disciplinary backgrounds wrestle with social science integration ...
Lire la suite