Free Delivery Over $100
8666 books were found.
Presents three different simple types of text generator which work at a micro level: Markov models, neural net models,... Read More >>
This book features selected papers presented at the 3rd International Conference on Wireless Communications and... Read More >>
This book constitutes the refereed proceedings of the 14th International Conference on Scalable Uncertainty Management,... Read More >>
This proceedings presents the papers of the 3rd EAI International Conference on Robotic Sensor Networks (ROSENET... Read More >>
With the rapid development of the Internet of Things, a gap has emerged in skills versus knowledge in an industry... Read More >>
This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on... Read More >>
By focusing on deep learning as the most representative technique of AI, this book provides a comprehensive overview... Read More >>
This book provides insights into recent trends and innovation of technologies aiming to provide sustainable and... Read More >>
This book constitutes refereed proceedings of the Workshops of the 16th European Dependable Computing Conference,... Read More >>
Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic... Read More >>
This book describes recent advances in text summarization, identifies remaining gaps and challenges, and proposes... Read More >>
Read More >>
This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks,... Read More >>
Smart Homes (SH) offer a promising approach to assisted living for the ageing population. Yet the main obstacle... Read More >>
This book offers a collection of high-quality peer-reviewed research papers presented at the Second International... Read More >>
This book constitutes the refereed proceedings of the 13th International Symposium on Algorithmic Game Theory, SAGT... Read More >>
"Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to... Read More >>
This book presents the combined proceedings of the 13th International Conference on Multimedia and Ubiquitous Engineering... Read More >>
This two volume set (CCIS 1257 and 1258) constitutes the refereed proceedings of the 6th International Conference... Read More >>
The theme of this year's workshop was “Security Protocols for Humans"" The topics covered included Designing for... Read More >>
This book gathers the outcomes of the 18th IEEE/ACIS International Conference on Computer and Information Science... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Well-Being in the Information... Read More >>