This two-volume set LNICST 666-667 constitutes the refereed proceedings of the19th EAI International Conference on Body Area Networks, BODYNETS 2024, held in Varanasi, India, during December 15–16, 2024.
This two-volume set LNICST 666-667 constitutes the refereed proceedings of the19th EAI International Conference on Body Area Networks, BODYNETS 2024, held in Varanasi, India, during December 15–16, 2024.
This two-volume set LNICST 666-667 constitutes the refereed proceedings of the19th EAI International Conference on Body Area Networks, BODYNETS 2024, held in Varanasi, India, during December 15–16, 2024.
This textbook covers the integration of wireless communications and radar sensing (ISAC), tackling some of the major technologies in 6G wireless networks.
This two-volume set LNICST 666-667 constitutes the refereed proceedings of the19th EAI International Conference on Body Area Networks, BODYNETS 2024, held in Varanasi, India, during December 15–16, 2024.
This textbook covers the integration of wireless communications and radar sensing (ISAC), tackling some of the major technologies in 6G wireless networks.
This book constitutes the revised selected papers of the 18th EAI International Conference on Mobile Multimedia Communications, MobiMedia 2025, held in Lhasa, China, during August 15–17, 2025.
This book constitutes the revised selected papers of the 18th EAI International Conference on Mobile Multimedia Communications, MobiMedia 2025, held in Lhasa, China, during August 15–17, 2025.
This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in Tartu, Estonia, during November 12-13, 2025.
This book constitutes the refereed proceedings of the 30th Nordic Conference on Secure IT Systems, NordSec 2025, held in Tartu, Estonia, during November 12-13, 2025.
This book constitutes the revised selected papers of the 8th Ibero-American Congress on Smart Cities, ICSC-Cities 2025, held in Puebla, México, during November 10–12, 2025.
This book constitutes the revised selected papers of the 8th Ibero-American Congress on Smart Cities, ICSC-Cities 2025, held in Puebla, México, during November 10–12, 2025.
This book constitutes the refereed post-conference proceedings of the 8th EAI International Conference on Innovations and Interdisciplinary Solutions for Underserved Areas, InterSol 2025, held in Ouagadougou, Burkina Faso, during July 3–4, 2025.
This book constitutes the refereed post-conference proceedings of the 8th EAI International Conference on Innovations and Interdisciplinary Solutions for Underserved Areas, InterSol 2025, held in Ouagadougou, Burkina Faso, during July 3–4, 2025.
This book constitutes the proceedings of the 6th International Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2025, held in Volgograd, Russia, during September 22–25, 2025.
This book constitutes the proceedings of the 6th International Conference on Creativity in Intellectual Technologies and Data Science, CIT&DS 2025, held in Volgograd, Russia, during September 22–25, 2025.
This book constitutes the refereed proceedings of the 4th EAI International Conference on Blockchain Technology and Emerging Applications, BlockTEA 2025, held in Venice, Italy, during September 18–19, 2025.
This book constitutes the refereed proceedings of the 4th EAI International Conference on Blockchain Technology and Emerging Applications, BlockTEA 2025, held in Venice, Italy, during September 18–19, 2025.
SmartShadow: Models and Methods for Pervasive Computing offers a new perspective on pervasive computing with SmartShadow, which is designed to model a user as a personality "e;shadow"e; and to model pervasive computing environments as user-centric dynamic virtual personal spaces.
The architecture of "e;The Worlds Biggest Machine^"e; is of course expressed in the many underlying communications standards; however it is far from explicit nor readily accessible.
Scientists from management and strategy, information systems, engineering and telecommunications have discussed a novel concept: Smart Business Networks.
Since the 1990s Grid Computing has emerged as a paradigm for accessing and managing distributed, heterogeneous and geographically spread resources, promising that we will be able to access computer power as easily as we can access the electric power grid.
Creating scientific workflow applications is a very challenging task due to the complexity of the distributed computing environments involved, the complex control and data flow requirements of scientific applications, and the lack of high-level languages and tools support.
Interference Cancellation Using Space-Time Processing and Precoding Design introduces original design methods to achieve interference cancellation, low-complexity decoding and full diversity for a series of multi-user systems.
This is the first book devoted to mobility management, covering the important principles, technologies and applications of mobility management based on years of academic research and industry experiences.
Das Buch verhilft Lesern dazu, das eigene Netz mit den Augen des Angreifers zu sehen – um seine Techniken zu verstehen und um sich besser schützen zu können.
Born after World War II, large-scale experimental high-energy physics (HEP) has found itself limited ever since by available accelerator, detector and computing technologies.
Since the 1990s Grid Computing has emerged as a paradigm for accessing and managing distributed, heterogeneous and geographically spread resources, promising that we will be able to access computer power as easily as we can access the electric power grid.
"e;Turning Points: The Nature of Creativity"e; discusses theories and methods focusing on a critical concept of intellectual turning points in the context of critical thinking, scientific discovery, and problem solving in general.
As one of the eighteen field-specific reports comprising the comprehensive scope of the strategic general report of the Chinese Academy of Sciences, this sub-report addresses long-range planning for developing science and technology in the field of information science & technology.
Process Management, with its key concepts of internal customer and process ownership, is becoming one of the most important competitive weapons for firms and can determine a strategic change in the way business is carried out (Business Process Reengineering - B.
A crucial step during the design and engineering of communication systems is the estimation of their performance and behavior; especially for mathematically complex or highly dynamic systems network simulation is particularly useful.
Peer-to-peer (P2P) technology, or peer computing, is a paradigm that is viewed as a potential technology for redesigning distributed architectures and, consequently, distributed processing.
The management of telecommunications networks and services is one of the most challenging of software endeavors-partly because of the size and the distributed nature of networks; partly because of the convergence of communications techno- gies; but mainly because of sheer complexity and diversity of networks and services.
In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality - the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else.
The rapid growth of RFID use in various supply chain operations, which has arisen from the development of Electronic Product Code (EPC) technology, has created a need for the consideration of security issues in the adoption of that technology.