Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
The papers present two technical tracks and three workshops: The Second Workshop on Edge Intelligence and Computing for Iot Communications and Applications, the Workshop on Satellite Communication Networks for Internet of Things, the Workshop on Satellite Communications
Bemærk: Kan ikke leveres før jul.
This two-volume set constitutes the post-conference proceedings of the 4th EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2020, held in Binzhou, China, in September 2020.
Bemærk: Kan ikke leveres før jul.
This book constitutes the post-conference proceedings of the Second EAI... Læs mere
Bemærk: Kan ikke leveres før jul.
This two-volume set LNICST 357-358 constitutes the post-conference proceedings of the 11th EAI International Conference on Wireless and Satellite Services, WiSATS 2020, held in Nanjing, China, in September 2020.
Bemærk: Kan ikke leveres før jul.
The papers focus on simulation methods, simulation techniques, simulation software, simulation performance, modeling formalisms, simulation verification and widely used frameworks.
Bemærk: Kan ikke leveres før jul.
The specific highlight of this book is focused on the application of integrated technologies in enhancing data models, better insights and discovery, intelligent predictions, smarter finance, smart retail, global verification, transparent governance, and innovative audit systems.
Bemærk: Kan ikke leveres før jul.
Since 1984, when Montgomery first introduced a method to evaluate modular... Læs mere
Bemærk: Kan ikke leveres før jul.
Since 1984, when Montgomery first introduced a method to evaluate modular... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed post-conference proceedings of the 4th... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed post-conference proceedings of the 4th... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption.