Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Recent Innovations in Computing: Proceedings of ICRIC 2020 (Lecture Notes in Electrical Engineering, 701)
Recent Innovations in Computing: Proceedings of ICRIC 2020 (Lecture Notes in Electrical Engineering, 701)
This book features selected papers presented at the 3rd International Conference on Recent Innovations in Computing (ICRIC 2020), held on 20–21 March 2020 at the Central University of Jammu, India, and organized by the university’s Department of Computer Science & Information Technology. It includes the latest research in the...
Information Security and Cryptology: 5th International Conference, Inscrypt 2009
Information Security and Cryptology: 5th International Conference, Inscrypt 2009

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are...

Applications of Artificial Intelligence Techniques in Engineering: SIGMA 2018, Volume 1 (Advances in Intelligent Systems and Computing (698))
Applications of Artificial Intelligence Techniques in Engineering: SIGMA 2018, Volume 1 (Advances in Intelligent Systems and Computing (698))

The book is a collection of high-quality, peer-reviewed innovative research papers from the International Conference on Signals, Machines and Automation (SIGMA 2018) held at Netaji Subhas Institute of Technology (NSIT), Delhi, India. The conference offered researchers from academic and industry the opportunity to present their...

AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. 

AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its...

Large-Scale Knowledge Resources: Construction and Application - Third International Conference on Large-Scale Knowledge Resources, LKR 2008
Large-Scale Knowledge Resources: Construction and Application - Third International Conference on Large-Scale Knowledge Resources, LKR 2008
At the start of the 21st century, we are now well on the way towards a knowledgeintensive society, in which knowledge plays ever more important roles. Thus, research interest should inevitably shift from information to knowledge, with the problems of building, organizing, maintaining and utilizing knowledge becoming central issues in a wide variety...
Software Development for Embedded Multi-core Systems: A Practical Guide Using Embedded Intel Architecture
Software Development for Embedded Multi-core Systems: A Practical Guide Using Embedded Intel Architecture
At the Fall 2006 Embedded Systems Conference, I was asked by Tiffany Gasbarrini, Acquisitions Editor of Elsevier Technology and Books if I would be interested in writing a book on embedded multi-core. I had just delivered a talk at the conference entitled, “ Development and Optimization Techniques for Multi-core SMP ” and had given...
ASP.NET MVC in Action
ASP.NET MVC in Action
The final version of ASP.NET MVC 1.0 was released March 2009 during the Mix 09 conference and nobody was caught by surprise with what was inside—and this is a good thing. Before the debut of the final version, the product team had released multiple public previews with full source code in an effort to raise the bar on openness and community...
Evaluation of Novel Approaches to Software Engineering: 3rd and 4th International Conference
Evaluation of Novel Approaches to Software Engineering: 3rd and 4th International Conference

This book is a peer-reviewed collection of papers, modified and extended for the purpose of this publication, but originally presented at the International Conference on Evaluation of Novel Approaches to Software Engineering 2008 and 2009 (ENASE 2008 / 2009). The book’s content is placed within the entire framework of software...

Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging
Medical Computer Vision: Recognition Techniques and Applications in Medical Imaging

The Workshop on Medical Computer Vision (MICCAI-MCV 2010) was held in conjunction with the 13th International Conference on Medical Image Computing and Computer – Assisted Intervention (MICCAI 2010) on September 20, 2010 in Beijing, China. The one-day workshop focused on recognition techniques and applications in medical imaging. The...

Writing for Science and Engineering, Second Edition: Papers, Presentations and Reports (Elsevier Insights)
Writing for Science and Engineering, Second Edition: Papers, Presentations and Reports (Elsevier Insights)

Learning how to write clearly and concisely is an integral part of furthering your research career; however, doing so is not always easy. In this second edition, fully updated and revised, Dr. Silyn-Roberts explains in plain English the steps to writing abstracts, theses, journal papers, funding bids, literature reviews, and more. The book...

Computing and Philosophy: Selected Papers from IACAP 2014 (Synthese Library)
Computing and Philosophy: Selected Papers from IACAP 2014 (Synthese Library)

This volume offers very selected papers from the 2014 conference of the “International Association for Computing and Philosophy” (IACAP) - a conference tradition of 28 years. The theme of the papers is the two-way relation between computing technologies and philosophical questions: Computing technologies both raise new...

Emotions in Organizational Behavior
Emotions in Organizational Behavior
This edited volume looks at the range of research on emotions within an organizational behaviour framework and it organized in terms of the individual and interpersonal and organizational levels. Particular emphasis was made to bring in leading researchers from international areas.

This volume was conceived and compiled to meet the need
...
unlimited object storage image
Result Page: 87 86 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy