0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (2)
  • R250 - R500 (14)
  • R500+ (4,482)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Agents and Peer-to-Peer Computing - 7th International Workshop, AP2PC 2008, Estoril, Portugal, May 13, 2008 and 8th... Agents and Peer-to-Peer Computing - 7th International Workshop, AP2PC 2008, Estoril, Portugal, May 13, 2008 and 8th International Workshop, AP2PC 2009, Budapest, Hungary, May 11, 2009. Revised Selected Papers (Paperback, 2012 ed.)
Domenico Beneventano, Zoran Despotovic, Francesco Guerra, Sam Joseph, Gianluca Moro, …
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 7th International Workshop on Agents and Peer-to-Peer Computing, AP2PC 2008, held in Estoril, Portugal, in May 2008 and the 8th International Workshop on Agents and Peer-to-Peer Computing, AP2PC 2009, held in Budapest, Hungary, May 2009, co-located with the International Joint Conference on Autonomous Agents and Multi-Agent Systems, AAMAS. The 13 revised full papers presented were carefully reviewed and selected from numerous submissions. The volume is organized in topical sections on social welfare, distributed information sharing, and network organization and efficiency.

Internet of Things - International Workshop, IOT 2012, Changsha, China, August 17-19, 2012. Proceedings (Paperback, 2012 ed.):... Internet of Things - International Workshop, IOT 2012, Changsha, China, August 17-19, 2012. Proceedings (Paperback, 2012 ed.)
Yongheng Wang, Xiaoming Zhang
R1,514 Discovery Miles 15 140 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Workshop on Internet of Things, IOT 2012, held in Changsha, China, during August 17-19. The 95 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on wireless sensor networks; RFID; sensors and equipments; data processing; security; applications and others.

Internet of Things, Smart Spaces, and Next Generation Networking - 12th International Conference, NEW2AN 2012, and 5th... Internet of Things, Smart Spaces, and Next Generation Networking - 12th International Conference, NEW2AN 2012, and 5th Conference, ruSMART 2012, St. Petersburg, Russia, August 27-29, 2012, Proceedings (Paperback, 2012 ed.)
Sergey Andreev, Sergey Balandin, Yevgeni Koucheryavy
R1,458 Discovery Miles 14 580 Ships in 18 - 22 working days

This book constitutes the joint refereed proceedings of the 12 International Conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking, NEW2AN, and the 5th Conference on Internet of Things and Smart Spaces, ruSMART 2012, held in St. Petersburg, Russia, in August 2012. The total of 42 papers was carefully reviewed and selected for inclusion in this book. The 14 papers selected from ruSMART are organized in topical sections named: defining an internet-of-things ecosystem; future services; and smart space governing through service mashups. The 28 papers from NEW2AN deal with the following topics: wireless cellular networks; ad-hoc, mesh, and delay-tolerant networks; scalability, cognition, and self-organization; traffic and internet applications; and wireless sensor networks. They also contain 4 selected papers from the NEW2AN 2012 winter session.

E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected... E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-20, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Aggelos Kiayias, Helger Lipmaa
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This volume constitutes the thoroughly refereed post-conference proceedings of the Third Conference on E-Voting and Identity, VOTE-ID 2011, held in Tallinn, Estonia, in September 2011. The 15 revised full papers presented were carefully reviewed and selected from 33 submissions. They are organized in topical sections on Norwegian internet voting, voting systems I and II, pret a voter and trivitas, and experiences.

Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25,... Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013, Proceedings (Paperback, 2013 ed.)
Salvatore J Stolfo, Angelos Stavrou, Charles V. Wright
R1,460 Discovery Miles 14 600 Ships in 18 - 22 working days

This book constitutes the proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2013, held in Rodney Bay, St. Lucia in October 2013. The volume contains 22 full papers that were carefully reviewed and selected from 95 submissions, as well as 10 poster papers selected from the 23 submissions. The papers address all current topics in computer security ranged from hardware-level security, server, web, mobile, and cloud-based security, malware analysis, and web and network privacy.

Economics of Grids, Clouds, Systems, and Services - 10th International Conference, GECON 2013, Zaragoza, Spain, September... Economics of Grids, Clouds, Systems, and Services - 10th International Conference, GECON 2013, Zaragoza, Spain, September 18-20, 2013, Proceedings (Paperback, 2013 ed.)
Joern Altmann, Kurt Vanmechelen, Omer F. Rana
R1,409 Discovery Miles 14 090 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Economics of Grids, Clouds, Systems, and Services, GECON 2013, held in Zaragoza, Spain, in September 2013.The 20 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: business models, energy consumption, resource allocation, work in progress on resource allocation, work in progress on pricing, quality of service, work in progress on utility and ROI modeling.

Security, Privacy, and Applied Cryptography Engineering - Third International Conference, SPACE 2013, Kharagpur, India, October... Security, Privacy, and Applied Cryptography Engineering - Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013, Proceedings (Paperback, 2013 ed.)
Benedikt Gierlichs, Sylvain Guilley, Debdeep Mukhopadhyay
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Security, Privacy and Applied Cryptography Engineering held in Kharagpur, India, in October 2013. The 12 papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on implementations and protocols, side channel attacks and countermeasures, identity-based identification schemes, and signatures.

Progress in Cryptology - LATINCRYPT 2012 - 2nd International Conference on Cryptology and Information Security in Latin... Progress in Cryptology - LATINCRYPT 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012, Proceedings (Paperback, 2012 ed.)
Alejandro Hevia, Gregory Neven
R1,419 Discovery Miles 14 190 Ships in 18 - 22 working days

This book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on elliptic curves, cryptographic protocols, implementations, foundations, and symmetric-key cryptography.

Trustworthy Global Computing - 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised... Trustworthy Global Computing - 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Catuscia Palamidessi, Mark D. Ryan
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Symposium on Trustworthy Global Computing, TGC 2012, held in Newcastle upon Tyne, UK, in September 2012. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 14 submissions. The papers cover a wide range of topics in the area of global computing and reliable computation in the so-called global computers, i.e., those computational abstractions emerging in large-scale infrastructures such as service-oriented architectures, autonomic systems and cloud computing, providing frameworks, tools, algorithms and protocols for designing open-ended, large-scale applications and for reasoning about their behavior and properties in a rigorous way.

Engineering Applications of Neural Networks - 14th International Conference, EANN 2013, Halkidiki, Greece, September 2013,... Engineering Applications of Neural Networks - 14th International Conference, EANN 2013, Halkidiki, Greece, September 2013, Proceedings, Part II (Paperback, 2013 ed.)
Lazaros S. Iliadis, Harris Papadopoulos, Chrisina Jayne
R1,423 Discovery Miles 14 230 Ships in 18 - 22 working days

The two volumes set, CCIS 383 and 384, constitutes the refereed proceedings of the 14th International Conference on Engineering Applications of Neural Networks, EANN 2013, held on Halkidiki, Greece, in September 2013. The 91 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers describe the applications of artificial neural networks and other soft computing approaches to various fields such as pattern recognition-predictors, soft computing applications, medical applications of AI, fuzzy inference, evolutionary algorithms, classification, learning and data mining, control techniques-aspects of AI evolution, image and video analysis, classification, pattern recognition, social media and community based governance, medical applications of AI-bioinformatics and learning.

Evolutionary Algorithms in Management Applications (Paperback, Softcover reprint of the original 1st ed. 1995): Joerg Biethahn,... Evolutionary Algorithms in Management Applications (Paperback, Softcover reprint of the original 1st ed. 1995)
Joerg Biethahn, Volker Nissen
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

Evolutionary Algorithms (EA) are powerful search and optimisation techniques inspired by the mechanisms of natural evolution. They imitate, on an abstract level, biological principles such as a population based approach, the inheritance of information, the variation of information via crossover/mutation, and the selection of individuals based on fitness. The most well-known class of EA are Genetic Algorithms (GA), which have received much attention not only in the scientific community lately. Other variants of EA, in particular Genetic Programming, Evolution Strategies, and Evolutionary Programming are less popular, though very powerful too. Traditionally, most practical applications of EA have appeared in the technical sector. Management problems, for a long time, have been a rather neglected field of EA-research. This is surprising, since the great potential of evolutionary approaches for the business and economics domain was recognised in pioneering publications quite a while ago. John Holland, for instance, in his seminal book Adaptation in Natural and Artificial Systems (The University of Michigan Press, 1975) identified economics as one of the prime targets for a theory of adaptation, as formalised in his reproductive plans (later called Genetic Algorithms).

Structural Information and Communication Complexity - 20th International Colloquium, SIROCCO 2013, Ischia, Italy, July 1-3,... Structural Information and Communication Complexity - 20th International Colloquium, SIROCCO 2013, Ischia, Italy, July 1-3, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Thomas Moscibroda, Adele a Rescigno
R2,344 Discovery Miles 23 440 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2013, held in Ischia, Italy, in July 2013. The 28 revised full papers presented were carefully reviewed and selected from 67 submissions. SIROCCO is devoted to the study of communication and knowledge in distributed systems. Special emphasis is given to innovative approaches and fundamental understanding, in addition to efforts to optimize current designs. The typical areas include distributed computing, communication networks, game theory, parallel computing, social networks, mobile computing (including autonomous robots), peer to peer systems, communication complexity, fault tolerant graph theories and randomized/probabilistic issues in networks.

Buying, Supporting, Maintaining Software and Equipment - An IT Manager's Guide to Controlling the Product Lifecycle... Buying, Supporting, Maintaining Software and Equipment - An IT Manager's Guide to Controlling the Product Lifecycle (Hardcover)
Gay Gordon-Byrne
R3,656 Discovery Miles 36 560 Ships in 10 - 15 working days

Describing how to avoid common vendor traps, Buying, Supporting, Maintaining Software and Equipment: An IT Manager's Guide to Controlling the Product Lifecycle will help readers better control the negotiation of their IT products and services and, ultimately, better manage the lifecycle of those purchases. The book supplies an inside look at the methods and goals of vendors and their contracts-which are almost always in conflict with end-user goals. The text is set up to follow the way most people experience technology products and contracting decisions. It begins by explaining the significance of the decisions made at the time of product selection. It details what you need to focus on when negotiating service and support agreements and describes how to use purchase orders to negotiate more favorable agreements. Covers product acquisition, support, and maintenance Examines hardware and software warranty and support models Considers finance and accounting issues for maintenance and support Spells out technology product details Explains postwarranty support and maintenance Provides the understanding to better negotiate with vendor sales teams Illustrating the types of problems typically experienced during product use, the book describes how to better control the useful life of your equipment. It supplies tips on how to avoid excessive charges from predatory vendors and concludes by delving into issues of product end of life. Explaining how to manage support and maintenance issues for the long term, this book provides the understanding you need to make sure you are more knowledgeable about the products and services your organization needs than the vendor teams with whom you are negotiating.

Engineering Applications of Neural Networks - 14th International Conference, EANN 2013, Halkidiki, Greece, September 2013,... Engineering Applications of Neural Networks - 14th International Conference, EANN 2013, Halkidiki, Greece, September 2013, Proceedings, Part I (Paperback, 2013 ed.)
Lazaros S. Iliadis, Harris Papadopoulos, Chrisina Jayne
R1,473 Discovery Miles 14 730 Ships in 18 - 22 working days

The two volumes set, CCIS 383 and 384, constitutes the refereed proceedings of the 14th International Conference on Engineering Applications of Neural Networks, EANN 2013, held on Halkidiki, Greece, in September 2013. The 91 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers describe the applications of artificial neural networks and other soft computing approaches to various fields such as pattern recognition-predictors, soft computing applications, medical applications of AI, fuzzy inference, evolutionary algorithms, classification, learning and data mining, control techniques-aspects of AI evolution, image and video analysis, classification, pattern recognition, social media and community based governance, medical applications of AI-bioinformatics and learning.

Computer Information Systems and Industrial Management - 11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy,... Computer Information Systems and Industrial Management - 11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy, September 26-28, 2012, Proceedings (Paperback, 2012 ed.)
Agostino Cortesi, Nabendu Chaki, Khalid Saeed, Slawomir Wierzchon
R1,451 Discovery Miles 14 510 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Conference on Computer Information Systems and Industrial Management, CISIM 2012, held in Venice, Italy, in September 2012. The 35 revised full papers presented together with 2 keynote talks were carefully reviewed and selected from 80 submissions. The papers are organized in topical sections on security, access control and intrusion detection; pattern recognition and image processing; biometric applications; algorithms and data management; networking; and system models and risk assessment.

Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers... Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers (Paperback, 2012)
Liqun Chen, Moti Yung, Liehuang Zhu
R1,426 Discovery Miles 14 260 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Trusted Systems, INTRUST 2011, held in Beijing, China, in November 2011. The 21 revised full papers were carefully reviewed and selected from 34 submissions for inclusion in the book. Except these contributed papers the program of INTRUST also consisted of a workshop titled Asian Lounge on Trust, Security and Privacy consisting of six keynote speeches. The papers are organized in topical sections on trusted services, mobile trusted systems, security analysis, cryptographic aspects, trusted networks, implementation, and direct anonymous attestation.

Advances in Cryptology -- CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012,... Advances in Cryptology -- CRYPTO 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012, Proceedings (Paperback, 2012 ed.)
Reihaneh Safavi-Naini, Ran Canetti
R1,571 Discovery Miles 15 710 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 32nd Annual International Cryptology Conference, CRYPTO 2012, held in Santa Barbara, CA, USA, in August 2012. The 48 revised full papers presented were carefully reviewed and selected from 225 submissions. The volume also contains the abstracts of two invited talks. The papers are organized in topical sections on symmetric cryptosystems, secure computation, attribute-based and functional encryption, proofs systems, protocols, hash functions, composable security, privacy, leakage and side-channels, signatures, implementation analysis, black-box separation, cryptanalysis, quantum cryptography, and key encapsulation and one-way functions.

Bisociative Knowledge Discovery - An Introduction to Concept, Algorithms, Tools, and Applications (Paperback, 2012 ed.):... Bisociative Knowledge Discovery - An Introduction to Concept, Algorithms, Tools, and Applications (Paperback, 2012 ed.)
Michael R. Berthold
R1,575 Discovery Miles 15 750 Ships in 18 - 22 working days

Modern knowledge discovery methods enable users to discover complex patterns of various types in large information repositories. However, the underlying assumption has always been that the data to which the methods are applied to originates from one domain. The focus of this book, and the BISON project from which the contributions are originating, is a network based integration of various types of data repositories and the development of new ways to analyse and explore the resulting gigantic information networks. Instead of finding well defined global or local patterns they wanted to find domain bridging associations which are, by definition, not well defined since they will be especially interesting if they are sparse and have not been encountered before. The 32 contributions presented in this state-of-the-art volume together with a detailed introduction to the book are organized in topical sections on bisociation; representation and network creation; network analysis; exploration; and applications and evaluation.

Research in Attacks, Intrusions and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September... Research in Attacks, Intrusions and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012, Proceedings (Paperback, 2012 ed.)
Davide Balzarotti, Salvatore J Stolfo, Marco Cova
R1,440 Discovery Miles 14 400 Ships in 18 - 22 working days

This book constitutes the proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2012, held in Amsterdam, The Netherlands in September 2012. The 18 full and 12 poster papers presented were carefully reviewed and selected from 84 submissions. The papers address all current topics in virtualization, attacks and defenses, host and network security, fraud detection and underground economy, web security, intrusion detection.

Wireless Virtualization (Paperback, 2013 ed.): Heming Wen, Prabhat Kumar Tiwary, Tho Le-Ngoc Wireless Virtualization (Paperback, 2013 ed.)
Heming Wen, Prabhat Kumar Tiwary, Tho Le-Ngoc
R1,698 Discovery Miles 16 980 Ships in 18 - 22 working days

This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiquitous networks. Three main wireless virtualization perspectives are explored, along with the potential challenges and requirements of a sustainable wireless virtualization framework. Finally, it presents an example of a multi-perspective wireless virtualization framework. The readers learn the latest concepts in the application of wireless virtualization as well as its relationship with cutting-edge wireless technologies such as software-defined radio (SDR) and cognitive radio.

Smart Networks - IFIP TC6 / WG6.7 Seventh International Conference on Intelligence in Networks (SmartNet 2002) April 8-10,... Smart Networks - IFIP TC6 / WG6.7 Seventh International Conference on Intelligence in Networks (SmartNet 2002) April 8-10, 2002, Saariselka, Lapland, Finland (Paperback, Softcover reprint of the original 1st ed. 2002)
Olli Martikainen, Kimmo Raatikainen, Jenni Hyvarinen
R2,660 Discovery Miles 26 600 Ships in 18 - 22 working days

Smart Networks comprises the proceedings of Smartnet'2002, the seventh conference on Intelligence in Networks, which was sponsored by the International Federation for Information Processing (IFIP) and organized by Working Group 6.7. It was held in Saariselka, Finland, in April 2002. The conference series closely reflects the developments in networking.

Intelligent Virtual Agents - 12th International Conference, IVA 2012, Santa Cruz, CA, USA, September, 12-14, 2012. Proceedings... Intelligent Virtual Agents - 12th International Conference, IVA 2012, Santa Cruz, CA, USA, September, 12-14, 2012. Proceedings (Paperback, 2012 ed.)
Yukiko Nakano, Michael Neff, Ana Paiva, Marilyn Walker
R1,476 Discovery Miles 14 760 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th International Conference on Intelligent Virtual Agents, IVA 2012, held in Santa Cruz, CA, USA, in September 2012. The 17 revised full papers presented together with 31 short papers and 18 poster papers were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on IVAs on learning environments; emotion and personality; evaluation and empirical studies; multimodal perception and expression; narrative and interactive applications; social interaction; authoring and tools; conceptual frameworks.

Structural Information and Communication Complexity - 19th International Colloquium, SIROCCO 2012, Reykjavik, Iceland, June 30... Structural Information and Communication Complexity - 19th International Colloquium, SIROCCO 2012, Reykjavik, Iceland, June 30 - July 2, 2012, Revised Selected Papers (Paperback)
Guy Even, Magnus M. Halldorsson
R1,424 Discovery Miles 14 240 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 19th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2012, held in Reykjavik, Iceland for 3 days starting June 30, 2012. The 28 revised full papers presented were carefully reviewed and selected from 54 submissions. SIROCCO is devoted to the study of communication and knowledge in distributed systems. Special emphasis is given to innovative approaches and fundamental understanding, in addition to efforts to optimize current designs. The typical areas include distributed computing, communication networks, game theory, parallel computing, social networks, mobile computing (including autonomous robots), peer to peer systems, communication complexity, fault tolerant graph theories, and randomized/probabilistic issues in networks.

CONCUR 2012- Concurrency Theory - 23rd International Conference, CONCUR 2012, Newcastle upon Tyne, September 4-7, 2012.... CONCUR 2012- Concurrency Theory - 23rd International Conference, CONCUR 2012, Newcastle upon Tyne, September 4-7, 2012. Proceedings (Paperback, 2012 ed.)
Maciej Koutny, Irek Ulidowski
R1,489 Discovery Miles 14 890 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed proceedings of the 23rd International Conference on Concurrency Theory, CONCUR 2012, held in Newcastle upon Tyne, UK, September 4-7, 2012. The 35 revised full papers presented together with 4 invited talks were carefully reviewed and selected from 97 submissions. The papers are organized in topics such as reachability analysis; qualitative and timed systems; behavioural equivalences; temporal logics; session types; abstraction; mobility and space in process algebras; stochastic systems; probabilistic systems; Petri nets and non-sequential semantics; verification; decidability.

Mobile and Ubiquitous Systems: Computing, Networking, and Services - 9th International Conference, MOBIQUITOUS 2012, Beijing,... Mobile and Ubiquitous Systems: Computing, Networking, and Services - 9th International Conference, MOBIQUITOUS 2012, Beijing, China, December 12-14, 2012. Revised Selected Papers (Paperback, 2013 ed.)
Kan Zheng, Mo Li, Hungbo Jiang
R2,040 Discovery Miles 20 400 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2012, held in Beijing, China, Denmark, in December 2012. The revised full papers presented were carefully reviewed and selected from numerous submissions. They cover a wide range of topics such as localization and tracking, search and discovery, classification and profiling, context awareness and architecture, location and activity recognition. The proceedings also include papers from the best paper session and the industry track, as well as poster and demo papers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
A Touch of Doubt - On Haptic Scepticism
Rachel Aumiller Hardcover R2,634 Discovery Miles 26 340
Gigo Pattern Blocks Activity Cards…
R189 R151 Discovery Miles 1 510
All Dhal'd Up - Every Day, Indian-ish…
Kamini Pather Hardcover R420 R319 Discovery Miles 3 190
Quercetti - Primo Clock
R326 Discovery Miles 3 260
A Tango With Death - Tolletjie Botha And…
Giancarlo Coccia Paperback R566 Discovery Miles 5 660
Entertaining Judgment - The Afterlife in…
Greg Garrett Hardcover R924 Discovery Miles 9 240
Joy of Chemistry - The Amazing Science…
Cathy Cobb, Monty L Fetterolf Paperback R409 Discovery Miles 4 090
Validation in Language Assessment
Antony John Kunnan Paperback R1,448 Discovery Miles 14 480
The Proust Effect - The Senses as…
Cretien van Campen Hardcover R1,241 Discovery Miles 12 410
Damaged Goods - The Rise and Fall of Sir…
Oliver Shah Paperback  (1)
R289 R264 Discovery Miles 2 640

 

Partners