Queueing networks constitute a large family of stochastic models, involving jobs that enter a network, compete for service, and eventually leave the network upon completion of service.
Technological advancements in recent years have enabled the development of tiny, cheap disposable and self contained battery powered computers, known as sensor nodes or "e;motes"e;, which can accept input from an attached sensor, process this input and transmit the results wirelessly to some interested device(s).
"e;Innovative IoT: Comprehensive Guide"e; is an extensive exploration of the Internet of Things (IoT) and its transformative impact across various sectors.
This book presents an integrated study of metamaterial-based large-scale antenna arrays and beamforming optimization for both Half-Duplex (HD) and Full-Duplex (FD) massive MIMO (mMIMO) systems.
This book constitutes the refereed proceedings of the 4th International Conference on Transdisciplinary Multispectral Modelling and Cooperation for the Preservation of Cultural Heritage Addressing World Challenges, TMM-CH 2025, held in Athens, Greece during April 7-9, 2025.
This book constitutes the refereed proceedings of the 4th International Conference on Transdisciplinary Multispectral Modelling and Cooperation for the Preservation of Cultural Heritage Addressing World Challenges, TMM-CH 2025, held in Athens, Greece during April 7-9, 2025.
Beyond 5G and 6G Networks, the AI-Native Revolution explores the transformative convergence of generative artificial intelligence (GenAI), large language models (LLMs), and next-generation telecommunications.
This book constitutes the thoroughly refereed post-proceedings of the 10th International Workshop on Design, Specification, and Verification of Interactive Systems, DSV-IS 2003, held in Funchal, Madeira Island, Portugal, in June 2003.
This book consitutes the refereed joint proceedings of the First European Workshop on Evolutionary Computation in Image Analysis and Signal Processing, EvoIASP '99 and of the First European Workshop on Evolutionary Telecommunications, EuroEcTel '99, held in Goteborg, Sweden in May 1999.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
This book comprises selected papers from the 18th International Conference on Multimedia and Ubiquitous Engineering (MUE 2024, Chongqing, China) and the 19th International Conference on Future Information Technology (Future Tech 2024, Chongqing, China).
This book CCIS 2774 constitutes the refereed proceedings of the 40th CCF National Conference of Computer Applications, CCF NCCA 2025, held in Beijing, China, during August 7–9, 2025.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
This book CCIS 2774 constitutes the refereed proceedings of the 40th CCF National Conference of Computer Applications, CCF NCCA 2025, held in Beijing, China, during August 7–9, 2025.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
This book comprises selected papers from the 18th International Conference on Multimedia and Ubiquitous Engineering (MUE 2024, Chongqing, China) and the 19th International Conference on Future Information Technology (Future Tech 2024, Chongqing, China).
This book explores the reliability and security challenges of Computing-in-Memory (CIM), a promising approach to overcoming the limitations of traditional computing.
This book constitutes the refereed proceedings of the 15th EAI International Conference, BROADNETS 2024, held in Cardiff, UK, during December 14–15, 2024.
This book explores the reliability and security challenges of Computing-in-Memory (CIM), a promising approach to overcoming the limitations of traditional computing.
This two-volume set constitutes the proceedings of the 20th International Symposium, ISVC 2025, held in Las Vegas, NV, USA, during November 17–19, 2025.
This two-volume set constitutes the proceedings of the 20th International Symposium, ISVC 2025, held in Las Vegas, NV, USA, during November 17–19, 2025.
This book constitutes the refereed proceedings of the 15th EAI International Conference, BROADNETS 2024, held in Cardiff, UK, during December 14–15, 2024.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
The Silent Hands: Navigating the World of Hidden Cyber Forces takes readers on a journey into the shadowy world of rootkits, privilege escalation, and the silent attackers that manipulate systems we rely on.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
This two-volume set constitutes the proceedings of the 20th International Symposium, ISVC 2025, held in Las Vegas, NV, USA, during November 17–19, 2025.
This two-volume set constitutes the proceedings of the 20th International Symposium, ISVC 2025, held in Las Vegas, NV, USA, during November 17–19, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The 8-volume set LNCS 16245-16252 constitutes the refereed proceedings of the 31st International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025, which took place in Melbourne, Australia, during December 8–12, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
This two-volume set constitutes the refereed proceedings of the 18th International Conference on Interactive Digital Storytelling, ICIDS 2025, held in Saint Julian, Malta, during December 1–5, 2025.
This two-volume set constitutes the refereed proceedings of the 18th International Conference on Interactive Digital Storytelling, ICIDS 2025, held in Saint Julian, Malta, during December 1–5, 2025.