 |
|
 Mobility, Data Mining and Privacy: Geographic Knowledge DiscoveryThe technologies of mobile communications and ubiquitous computing pervade our society, and wireless networks sense the movement of people and vehicles, generating large volumes of mobility data. This is a scenario of great opportunities and risks: on one side, mining this data can produce useful knowledge, supporting sustainable mobility and... |  |  |  |  Computational Intelligence: Concepts to ImplementationsRuss Eberhart and Yuhui Shi have succeeded in integrating various natural and engineering disciplines to establish Computational Intelligence. This is the first comprehensive textbook, including lots of practical examples. Professor Shun-ichi Amari, RIKEN Brain Science Institute, Japan
Computational Intelligence describes a large,... |
|
 How to Cheat at Deploying and Securing RFIDRFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.
For security... |  |  |  |  Hybrid Systems: Computation and Control: 7th International Workshop, HSCC 2004, Philadelphia, PA, USA, March 25-27, 2004, ProceedingsThis book constitutes the refereed proceedings of the 7th International Workshop on Hybrid Systems: Computation and Control, HSCC 2004, held in Philadelphia, PA, USA, in March 2004.
The 43 revised full papers presented together with an invited article were carefully reviewed and selected from 117 submissions. The papers address all current... |
|
|
|
Result Page: 265 264 263 262 261 260 259 258 257 256 255 254 253 252 251 250 249 248 247 |