|
Throwing sheep in the boardroom
|
Matthew Fraser,Matthew Fraser |
"If you want to understand why Wikipedia is changing the world, this book is a must read." --Jimmy Wales, Founder, Wikipedia "This book is a must read for all - social activists, politicians or ma… |
OL12894488W |
|
Agents and Artificial Intelligence
|
Joaquim Filipe |
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Agents and Artificial Intelligence, ICAART 2011, held in Rome, Italy, in January 201… |
OL19825073W |
|
AsiaSim 2012
|
Tianyuan Xiao |
The Three-Volume-Set CCIS 323, 324, 325 (AsiaSim 2012) together with the Two-Volume-Set CCIS 326, 327 (ICSC 2012) constitutes the refereed proceedings of the Asia Simulation Conference, AsiaSim 2012,… |
OL19828197W |
|
Automata, Languages, and Programming
|
Fedor V. Fomin |
This two-volume set of LNCS 7965 and LNCS 7966 constitutes the refereed proceedings of the 40th International Colloquium on Automata, Languages and Programming, ICALP 2013, held in Riga, Latvia, in J… |
OL19829191W |
|
Cross-Media Service Delivery
|
Diomidis Spinellis |
This work uniquely brings together a cross-disciplinary core of contributors to address the technical and business issues of cross-media publishing and service delivery. The contributions are organiz… |
OL19838764W |
|
Data Privacy Management and Autonomous Spontaneous Security
|
Roberto Pietro |
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Wor… |
OL19840128W |
|
A Discipline of Multiprogramming
|
Jayadev Misra |
In this book, a programming model is developed that addresses the fundamental issues of "large-scale programming," unifying several concepts from database theory, object-oriented programming and desi… |
OL19843508W |
|
Distributed Infrastructure Support for Electronic Commerce Applications
|
Hans-Arno Jacobsen |
Distributed Infrastructure Support For E-Commerce And Distributed Applications is organized in three parts. The first part constitutes an overview, a more detailed motivation of the problem context, … |
OL19843756W |
|
Elements of Distributed Algorithms
|
Wolfgang Reisig |
Distributed Computing is rapidly becoming the principal computing paradigm in diverse areas of computing, communication, and control. Processor clusters, local and wide area networks, and the informa… |
OL19846647W |
|
Introduction to Rare Event Simulation
|
James Antonio Bucklew |
This book presents a unified theory of rare event simulation and the variance reduction technique known as importance sampling from the point of view of the probabilistic theory of large deviations. … |
OL19859212W |
|
Intrusion Detection in Distributed Systems
|
Peng Ning |
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribu… |
OL19859329W |
|
MotionCast for Mobile Wireless Networks
|
Xinbing Wang |
<i>MotionCast for Mobile Wireless Networks</i> provides an overview on the research for mobile ad-hoc networks regarding capacity and connectivity. Wireless ad-hoc networks are useful when there is a… |
OL19889277W |
|
Multimedia Systems and Techniques
|
Borko Furht |
Multimedia computing has emerged in the last few years as a major area of research. Multimedia computer systems have opened a wide range of applications by combining a variety of information sources,… |
OL19889554W |
|
Networked Digital Technologies
|
Rachid Benlamri |
This two-volume-set (CCIS 293 and CCIS 294) constitutes the refereed proceedings of the International Conference on Networked Digital Technologies, NDT 2012, held in Dubai, UAE, in April 2012. The 96… |
OL19890271W |
|
Performance Analysis and Modeling of Digital Transmission Systems
|
William Turin |
This book describes mathematical methods for analyzing digital transmission system performance. In contrast with publications that use an idealistic model of channels with independent errors, this bo… |
OL19893947W |
|
Pervasive Computing and the Networked World
|
Qiaohong Zu |
This book constitutes the refereed post-proceedings of the Joint International Conference on Pervasive Computing and the Networked World, ICPCA-SWS 2012, held in Istanbul, Turkey, in November 2012. T… |
OL19894204W |
|
Protocols for Authentication and Key Establishment
|
Colin Boyd |
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities o… |
OL19897610W |
|
The Quintessential PIC Microcontroller
|
Sid Katzen |
The Quintessential PIC Microcontroller deals with the central `intelligence of most smart embedded digital systems and aims to give the reader the confidence to design, construct and program a real w… |
OL19898398W |
|
Research Directions in Data and Applications Security
|
Ehud Gudes |
Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems an… |
OL19899673W |
|
Security and Privacy in Communication Networks
|
Angelos D. Keromytis |
This volume presents the refereed proceedings of the 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012, held in Padua, Italy, in September 2012. The… |
OL19901284W |