by
Herrera-Viedma, Enrique. editor.
Format:
Electronic Resources
Excerpt:
Soft Computing in Web Information Retrieval Models and Applications / Herrera-Viedma, Enrique
by
Satapathy, Suresh Chandra. editor.
Format:
Electronic Resources
Excerpt:
technologies and applications of soft computing, artificial intelligence and communication. In addition, a
View Other Search Results
by
Boutaba, Raouf. editor.
Format:
Electronic Resources
Excerpt:
LANs -- Optical Networking -- Performance of Internet & Web Applications -- Ad Hoc Networks I
by
Barolli, Leonard. editor.
Format:
Electronic Resources
Excerpt:
applications in information networking such as wireless sensor networks, ad hoc networks, peer-to-peer systems
by
Celebi, M. Emre. editor.
Format:
Electronic Resources
Excerpt:
researchers and practitioners. The authors outline how these algorithms have found numerous applications
by
Malek, Miroslaw. editor.
Format:
Electronic Resources
Excerpt:
-- Using Logical Data Protection and Recovery to Improve Data Availability -- Contract-Based Web Service
by
Barolli, Leonard. editor.
Format:
Electronic Resources
Excerpt:
. Information networking, data and Web technologies are currently undergoing a rapid evolution. As a result
by
Nagar, Atulya. editor.
Format:
Electronic Resources
Excerpt:
, Web Technology, and Web Security -- Section G: Big Data and Recommendation Systems -- Section H: Fault
by
Elleithy, Khaled. editor.
Format:
Electronic Resources
Excerpt:
Modeling and Development, and Web Applications. New trends in computing: Computers for People of Special
by
Park, James J. (Jong Hyuk). editor.
Format:
Electronic Resources
Excerpt:
multimedia convergence, ubiquitous and pervasive computing, intelligent computing and applications, embedded
by
Kim, Kuinam J. editor.
Format:
Electronic Resources
Excerpt:
Applications (ICISA 2016) and provides a snapshot of the latest issues encountered in technical convergence and
by
Sobh, Tarek. editor.
Format:
Electronic Resources
Excerpt:
Applications, Block Ciphers Design Principles, Block Ciphers Modes of Operation, Electronic Mail Security
Limit Search Results
Narrowed by: