Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book.
Bemærk: Kan ikke leveres før jul.
Marc-André Kaufhold explores user expectations and design implications for the utilization of new media in crisis management and response.
Bemærk: Kan ikke leveres før jul.
This book provides an overview of crowdsourced data management. By surveying and synthesizing a wide spectrum of studies on crowdsourced data management, the book outlines important factors that need to be considered to improve crowdsourced data management.
Bemærk: Kan ikke leveres før jul.
The book covers a wide range of wireless communication and network technologies, and will help readers understand the role of wireless technologies in applications touching on various spheres of human life, e.g.
Bemærk: Kan ikke leveres før jul.
This book gathers selected papers presented at the 2nd International Conference on Computing, Communications and Data Engineering, held at Sri Padmavati Mahila Visvavidyalayam, Tirupati, India from 1 to 2 Feb 2019.
Bemærk: Kan ikke leveres før jul.
This book features a collection of high-quality, peer-reviewed research papers presented at the 7th International Conference on Innovations in Computer Science & Engineering (ICICSE 2019), held at Guru Nanak Institutions, Hyderabad, India, on 16–17 August 2019.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book features selected papers from the 6th International Conference on Mathematics and Computing (ICMC... Læs mere
Bemærk: Kan ikke leveres før jul.
Subsequently, to enhance the readability of this book, the authors also include real-time problems in RFIC designing, case studies from experimental results, and clearly demarking design guidelines for the 5G communication ICs designing.
Bemærk: Kan ikke leveres før jul.
Firstly, we focus on some fundamental issues in trajectory data mining and analytics, including data map-matching, data compression, and data protection.