Yazar
Mahmood, Zaigham. editor.
Format:
Electronic Resources
Alıntı:
Business Information Systems. https://scigraph.springernature.com/ontologies/product-market-codes
Yazar
Noguet, Dominique. editor.
Format:
Electronic Resources
Alıntı:
, HW architecture and implementations, next generation of cognitive networks, standards and business
View Other Search Results
Yazar
Luo, Yuan. author.
Format:
Electronic Resources
Alıntı:
dynamic spectrum networks. It explains various business models for different network settings, analyzing
Yazar
Ma, Yunqian. editor.
Format:
Electronic Resources
Alıntı:
learning, applied statistics, business intelligence, and artificial intelligence. The aim of this book is
Yazar
Balandin, Sergey. editor.
Format:
Electronic Resources
Alıntı:
, cellular systems, novel systems and techniques, business and services, signals and circuits, optical and
Yazar
Jaramillo, David. author.
Format:
Electronic Resources
Alıntı:
devices for personal and business purposes, the ability to keep the data secure and separate is critical
Yazar
Park, Doo-Soon. editor.
Format:
Electronic Resources
Alıntı:
internet computing -- 13 IT policy and business management -- II CUTE -- 1 Ubiquitous Communication and
Yazar
Di Martino, Beniamino. author.
Format:
Electronic Resources
Alıntı:
of cloud applications due to the different business models associated with resource consumption, and
Yazar
Balandin, Sergey. editor.
Format:
Electronic Resources
Alıntı:
-- Materials for Future Communications.- Generation and Analysis of Signals -- Business Aspects of Networking
Yazar
Aldini, Alessandro. editor.
Format:
Electronic Resources
Alıntı:
terms, e.g., of business opportunities and quality of experience, and to present adequate technology to
Yazar
López, Víctor. editor.
Format:
Electronic Resources
Alıntı:
can be observed, as day-time business users have very different demands to evening-time residential
Yazar
Almeida, Fernando. editor.
Format:
Electronic Resources
Alıntı:
CONVERGENCE -- Scenarios and Trials for CONVERGENCE -- Business Models and Exploitation -- Conclusions and