Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 56231-56240 results of 56761

This book constitutes the refereed proceedings of the 45th International Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2019, held in Nový Smokovec, Slovakia, in January 2019. The 34 full papers presented together with 6 invited talks were carefully reviewed and selected from 92 submissions. They presented new research results in the theory and practice of computer science in the each sub-area of... more...

This book constitutes the refereed proceedings of the 20th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2019, held in Cascais, Portugal, in January 2019. The 27 full papers presented together with the abstracts of 3 invited keynote talks were carefully reviewed and selected from 62 submissions. VMCAI provides topics including: program verification, model checking, abstract... more...

The Web has been with us now for almost 25 years. An integral part of our social, cultural and political lives, ‘new media’ is simply not that new anymore. Despite the rapidly expanding archives of information at our disposal, and the recent growth of interest in web history as a field of research, the information available to us still far outstrips our understanding of how to interpret it.  The SAGE Handbook of Web... more...

Smart Cities and intelligence are among the most significant topics in IoT. Intelligence in communication and infrastructure implementation is at the heart of this concept, and its development is a key issue in smart cities. This book addresses the challenges in realizing intelligence in smart cities and sensing platforms in the era of cloud computing and IoT, varying from cost and energy efficiency to availability and service quality.... more...

Social networking has increased drastically in recent years, resulting in an increased amount of data being created daily. Furthermore, diversity of issues and complexity of the social networks pose a challenge in social network mining. Traditional algorithm software cannot deal with such complex and vast amounts of data, necessitating the development of novel analytic approaches and tools. This reference work deals with social... more...


This book provides a methodological understanding of the theoretical and technical limitations to the longevity of Moore’s law. The book presents research on factors that have significant impact on the future of Moore’s law and those factors believed to sustain the trend of the last five decades. Research findings show that boundaries of Moore’s law primarily include physical restrictions of scaling electronic components to levels... more...

This is a monumental reference for the theory and practice of computer security. Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security. It provides excellent examples of ideas and mechanisms that demonstrate how disparate techniques and principles are combined... more...

This book contains a selection of the best papers given at an international conference on advanced computer systems. The Advanced Computer Systems Conference was held in October 2006, in Miedzyzdroje, Poland. The book is organized into four topical areas: Artificial Intelligence; Computer Security and Safety; Image Analysis, Graphics and Biometrics; and Computer Simulation and Data Analysis.

This SpringerBrief focuses on crucial issues for device-to-device (D2D) communications within the rapidly expanding 4G LTE toward 5G system.  Several critical technical challenges in D2D communications are discussed, and D2D standardization activities in 3GPP are provided. Topics range from proximity discovery and mode selection, to resource management. The authors investigate proximity detection solutions... more...

This updated and enlarged Second Edition provides in-depth, progressive studies of kinematic mechanisms and offers novel, simplified methods of solving typical problems that arise in mechanisms synthesis and analysis - concentrating on the use of algebra and trigonometry and minimizing the need for calculus.;It continues to furnish complete coverage of: key concepts, including kinematic terminology, uniformly accelerated motion, and the properties of... more...