You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the proceedings of the 14th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2019, held in Honolulu, HI, USA, in June 2019. The 43 full and 11 short papers presented were carefully reviewed and selected from 143 submissions. The papers deal with new ideas and recent advances in computer systems, wireless networks, distributed applications, and advanced algorithms that are pushing forward the new technologies for better information sharing, computer communication, and universal connected devices in various environments, especially in wireless networks.
This book constitutes the refereed proceedings of the Second Symposium on Programs as Data Objects, PADO 2001, held in Aarhus, Denmark, in May 2001. The 14 revised full papers presented were carefully reviewed and selected from 30 submissions. Various aspects of looking at programs as data objects are covered from the point of view of program analysis, program transformation, computational complexity, etc.
Lists citations with abstracts for aerospace related reports obtained from world wide sources and announces documents that have recently been entered into the NASA Scientific and Technical Information Database.
Mobile Multi-hop Ad Hoc Networks are collections of mobile nodes connected together over a wireless medium. These nodes can freely and dynamically self-organise into arbitrary and temporary, "ad-hoc" network topologies, allowing people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, (e.g., disaster recovery environments). The aim of this book is to present some of the most relevant results achieved by applying an experimental approach to the research on multi-hop ad hoc networks. The unique aspect of the book is to present measurements, experiences and lessons obtained by implementing ad hoc networks prototypes.
This book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC 2005, held in Beijing, China in November/December 2005. The 48 revised full papers and 20 revised short papers presented together with 3 invited papers were carefully selected from a total of 320 submissions. The papers are organized in topical sections on grid and system software, grid computing, peer-to-peer computing, web techniques, cluster computing, parallel programming and environment, network architecture, network security, network storage, multimedia service, and ubiquitous computing.
This book constitutes the refereed proceedings of the Third International Conference on Augmented Cognition, FAC 2007, held in Beijing, China, in July 2007, within the framework of the 12th International Conference on Human-Computer Interaction, HCII 2007, with 8 other thematically similar conferences. It covers general Augmented Cognition methods and techniques and discusses various Augmented Cognition applications.
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.
None