• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Książka:  » książki  » Springerbriefs in Computer Science

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC
 
Online Social Media Content Delivery: A Data-Driven Approach

Zhi Wang; Wenwu Zhu; Shiqiang Yang
This book explains how to use a data-driven approach to design strategies for social media content delivery. Secondly, the book describes data-driven models to capture information diffusion in online social networks and social media content propagation and popularity, before presenting prediction models for social media content delivery.
This book explains how to use a data-driven approach to design strategies for social media content delivery. Secondly, the book describes data-driven ...
cena: 220,86
 
Cloud Based 5g Wireless Networks

Yin Zhang; Min Chen
This SpringerBrief introduces key techniques for 5G wireless networks. The authors cover the development of wireless networks that led to 5G, and how 5G mobile communication technology (5G) can no longer be defined by a single business model or a typical technical characteristic. The discussed networks functions and services include Network Foundation Virtualization (N-FV), Cloud Radio Access Networks (Cloud-RAN), and Mobile Cloud Networking (MCN). The benefits of cloud platforms are examined, as are definable networking and green wireless networking. Other related and representative projects...
This SpringerBrief introduces key techniques for 5G wireless networks. The authors cover the development of wireless networks that led to 5G, and how ...
cena: 220,86
 
Android Application Security: A Semantics and Context-Aware Approach

Mu Zhang; Heng Yin
This SpringerBrief explains the emerging cyber threats that undermine Android application security. It further explores the opportunity to leverage the cutting-edge semantics and context-aware techniques to defend against such threats, including zero-day Android malware, deep software vulnerabilities, privacy breach and insufficient security warnings in app descriptions. The authors begin by introducing the background of the field, explaining the general operating system, programming features, and security mechanisms. The authors capture the semantic-level behavior of mobile applications and...
This SpringerBrief explains the emerging cyber threats that undermine Android application security. It further explores the opportunity to leverage th...
cena: 200,77
 
Information Security of Highly Critical Wireless Networks

Maurizio Martellini; Stanislav Abaimov; Sandro Gaycken
This SpringerBrief explores features of digital protocol wireless communications systems, and features of the emerging electrical smart grid. Both low power and high power wireless systems are described. The work also examines the cybersecurity vulnerabilities, threats and current levels of risks to critical infrastructures that rely on digital wireless technologies. Specific topics include areas of application for high criticality wireless networks (HCWN), modeling risks and vulnerabilities, governance and management frameworks, systemic mitigation, reliable operation, assessing...
This SpringerBrief explores features of digital protocol wireless communications systems, and features of the emerging electrical smart grid. Both low...
cena: 220,86
 
Privately and Publicly Verifiable Computing Techniques: A Survey

Denise Demirel; Lucas Schabhuser; Johannes Buchmann

This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highlights the properties each solution achieves. Further, it analyzes the level of security provided, how efficient the verification process is, who can act as a verifier and check the correctness of the result, which function class the verifiable computing scheme supports, and whether privacy with respect to t he input and/or output data is...

This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsou...

cena: 200,77
 
Computational Methods for Processing and Analysis of Biological Pathways

Anastasios Bezerianos; Andrei Dragomir; Panos Balomenos
This work offers a guided walkthrough of one of the most promising research areas in modern life sciences, enabling a deeper understanding of involved concepts and methodologies via an interdisciplinary view, focusing on both well-established approaches and cutting-edge research. Highlighting what pathway analysis can offer to both the experimentalist and the modeler, the text opens with an introduction to a general methodology that outlines common workflows shared by several methods. This is followed by a review of pathway and sub-pathway based approaches for systems pharmacology. The work...
This work offers a guided walkthrough of one of the most promising research areas in modern life sciences, enabling a deeper understanding of involved...
cena: 200,77
 
Research and Development in the Academy, Creative Industries and Applications

Rae Earnshaw

This book examines how creativity feeds through into typical application areas, and the lessons that can be learned from this. A number of Case Studies in creative and general application domains are included which illustrate how the academy and industry can collaborate to mutual benefit and advantage. It also examines the pros and cons of the collaboration, and what lessons can be learned from successes or failures in aspects of the implementation and delivery.

The academy has played a key role in the past in the research and development of key ideas and patents that have been...

This book examines how creativity feeds through into typical application areas, and the lessons that can be learned from this. A number of Case Stu...

cena: 200,77
 
Secure and Trustworthy Transportation Cyber-Physical Systems

Yunchuan Sun; Houbing Song
This book comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs). It then discusses in detail the principles and metrics of evaluating safety and privacy in TCPSs and elaborates the verification and analysis of secure, robust and trustworthy TCPSs.
This book comprehensively reviews the cyber security and privacy issues in transportation cyber-physical systems (TCPSs). It then discusses in detail ...
cena: 200,77
 
Resource Management for Internet of Things

Flavia C. Delicato; Paulo F. Pires; Thais Batista
This book investigates the pressing issue of resource management for Internet of Things (IoT). The unique IoT ecosystem poses new challenges and calls for unique and bespoke solutions to deal with these challenges. Using a holistic approach, the authors present a thorough study into the allocation of the resources available within IoT systems to accommodate application requirements. This is done by investigating different functionalities and architectural approaches involved in a basic workflow for managing the lifecycle of resources in an IoT system.

Resource Management for the...

This book investigates the pressing issue of resource management for Internet of Things (IoT). The unique IoT ecosystem poses new challenges and calls...
cena: 220,86
 
Crowd-Powered Mobile Computing and Smart Things

Seng Loke
This SpringerBrief provides a synergistic overview of technology trends by emphasizing five linked perspectives: crowd+cloud machines, extreme cooperation with smart things, scalable context-awareness, drone services for mobile crowds and social links in mobile crowds. The authors also highlight issues and challenges at the intersection of these trends.
Topics covered include cloud computing, Internet of Things, mobile and wearable computing, crowd computing, the culture of thing sharing, collective computing, and swarm dynamics. The brief is a useful resource and a starting point for...
This SpringerBrief provides a synergistic overview of technology trends by emphasizing five linked perspectives: crowd+cloud machines, extreme coopera...
cena: 200,77
ilość książek w kategorii: 352
Pierwsza Podprzednia  19  20  21  Następna Ostatnia


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia