Free Delivery Over $100
8990 books were found.
Constitutes the refereed proceedings of the 30th Annual International Cryptology Conference, CRYPTO 2010, held in... Read More >>
Covers chapters presented at WEIS 2009. This book features topics that include identity theft, modeling uncertainty's... Read More >>
This book constitutes the second part of the refereed proceedings of the Third International Conference, IC3 2010,... Read More >>
Constitutes the refereed proceedings of the 10th International Conference on Next Generation Teletraffic and Wired/Wireless... Read More >>
This book constitutes the refereed proceedings of the 11th International Workshop on Computational Logic in Multi-Agent... Read More >>
Read More >>
Grids, P2P and Services Computing, the 12th volume of the CoreGRID series, is based on the CoreGrid ERCIM Working... Read More >>
This book constitutes the first part of the refereed proceedings of the Third International Conference, IC3 2010,... Read More >>
This book presents an in-depth study on recent advances and research in Wireless Sensor Networks (WSNs). Existing... Read More >>
Constitutes the refereed proceedings of the 5th Annual International Conference on Wireless Algorithms, Systems,... Read More >>
The 6th International Conference on the Theory and Application of Diagrams – Diagrams 2010 – was held in Portland,... Read More >>
Habilitationsschrift Universität Stuttgart, 2009 Read More >>
Contains the refereed post-conference proceedings of the First International Self-Organizing Architectures Workshop... Read More >>
Constitutes the refereed proceedings of the 9th International Conference on Ad-Hoc, Mobile, and Wireless Networks,... Read More >>
Resource discovery is the process of identifying and locating existing resources thathavea particularproperty. Resource... Read More >>
Constitutes the proceedings of the 4th International Workshop on Critical Information Infrastructures Security,... Read More >>
ICISC 2009, the 12th International Conference on Information Security and Cryptology, was held in Seoul, Korea,... Read More >>
The papers handle topics such as access control, privacy of web based search, anonymus webs of trust, security attacks,... Read More >>
The Second International Conference on Networks and Communications (NeCoM 2010), the Second International Conference... Read More >>
Constitutes the refereed proceedings of the 4th International Conference on Learning and Intelligent Optimization,... Read More >>
Constitutes the refereed proceedings of the 7th International Conference on Detection of Intrusions and Malware,... Read More >>
It was devoted to all aspects of trusted computing systems, incl- ing trusted modules, platforms, networks, services... Read More >>
Constitutes the proceedings of the 16th Annual International Conference on Computing and Combinatorics, held in... Read More >>
"There is a newer version of this book, updated for software version 9.x and later. Look for ISBN 978-0983660750.... Read More >>
This unique and practical text introduces the principles of WLANs based upon the IEEE 802.11 standards, demonstrating... Read More >>