This book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...
Lire la suiteThe book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
Lire la suiteThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Lire la suiteTrusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...
Lire la suiteThis book constitutes the thoroughly refereed post-proceedings of the Second Symposium on Trustworthy Global Computing, TGC ...
Lire la suiteThis book presents new research on the mathematical description of tsunamis and hurricanes. The book uses the equivalence ...
Lire la suiteTurbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...
Lire la suiteThis volume introduces some basic mathematical models for cell cycle, proliferation, cancer, and cancer therapy.
Lire la suiteThe book offers an easy introduction to fast growing research areas in evolution of species, population genetics, ecological ...
Lire la suiteThis book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...
Lire la suiteThe book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
Lire la suiteThis book brings together the technological and business aspects of conducting commerce using ubiquitous and pervasive computing ...
Lire la suiteUltrasonic Nondestructive Evaluation Systems: Models and Measurements provides the latest information and techniques available ...
Lire la suiteThis work presents the foundations of dynamics and control for ultrasonic processing systems. The intention is to bridge ...
Lire la suiteThis book about The 5th International Conference on Unconventional Computation, UC 2006,organized under the auspices of the ...
Lire la suiteProvides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
Lire la suiteDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
Lire la suitea scientist can only come to a partial understanding of industrial transformation processes. This is so not only because ...
Lire la suiteThis book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
Lire la suiteThis volume contains the proceedings of the last ERCIM “User Interfaces for All” Workshop. The work of the ERCIM WG UI4ALL ...
Lire la suite