Account
Orders
Advanced search
This book, at first, explores the evolution of the IoT to SIoT and offers a comprehensive understanding of SIoT and trust management vis-à-vis SIoT. It subsequently envisages trust quantification models by employing key SIoT-specific trust features, including SIoT...
In this book, the authors first address the research issues by providing a motivating scenario, followed by the exploration of the principles and techniques of the challenging topics. Then they solve the raised research issues by developing a series of methodologies....
This book describes the design and implementation of Cloud Armor, a novel approach for credibility-based trust management and automatic discovery of cloud services in distributed and highly dynamic environments. This book also helps cloud users to understand the...
Web services and Service-Oriented Computing (SOC) have become thriving areas of academic research, joint university/industry research projects, and novel IT products on the market. SOC is the computing paradigm that usesWeb services as building blocks for the...
Are you an engineer or a researcher developing RFID systems?Are you a manager considering deploying RFID-based applications? If so, this book is for you. Covering modern RFID systems, the challenges to RFID implementation are addressed using specific industrial research...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers