Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Traditionally, the consensus protocols are studied either in the synchronous or in the asynchronous communication setting and very often the protocols in the former category serve as the basis for the protocols in the latter category.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed post-conference proceedings of the 4th... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book explains the strong push for the security of digital currencies and the sustainability of global trade development. It focuses on the role of... Læs mere
Bemærk: Kan ikke leveres før jul.
Readers will get an insight into the current development of mechatronics systems in the context of scientific disciplines and present new results of research and development, indicating the trends of development in this interdisciplinary field.
Bemærk: Kan ikke leveres før jul.
This book is an in-depth exploration of blockchain and smart contracts technologies, systematically addressing their theoretical foundations while highlighting concrete applications in several key sectors.
Bemærk: Kan ikke leveres før jul.
This proceedings volume convenes selected, revised papers presented at the 52nd Southeastern International Conference on Combinatorics, Graph Theory and Computing (SEICCGTC 2021), virtually held at Florida Atlantic University in Boca Raton, USA, on March 8-12, 2021.
Bemærk: Kan ikke leveres før jul.
EMCIS covers technical, organizational, business, and social issues in the application of information technology and is dedicated to the definition and establishment of Information Systems (IS) as a discipline of high impact for IS professionals and practitioners.
Bemærk: Kan ikke leveres før jul.
The papers are organized in the following topical sections: Emerging Technologies and Protection of Personal Data, Data Protection Principles and Data Subject Rights, Modelling Data Protection and Privacy, and Modelling Perceptions of Privacy.
Bemærk: Kan ikke leveres før jul.
This book provides a detailed study on sources of encrypted network traffic, methods and techniques for analyzing, classifying and detecting the encrypted traffic.
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 16th IFIP... Læs mere