You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
اقرأ المزيد
3DTV require the integration of a diversity of key technologies from computing to graphics, imaging to display, and signal ...
اقرأ المزيد
The thymic pathology is related to several complex congenital, non-oncological, and oncological diseases. Many of these illnesses ...
اقرأ المزيد
One of the main reasons for publishing this second edition of “T- roid Cancer” is the fact that the first edition has ...
اقرأ المزيد
Thyroid Cytopathology uses a simple algorithmic approach to the diagnosis of thyroid fine needle aspirations (FNA). This ...
اقرأ المزيد
This book consists of contributions given in honor of Wolfgang J.R. Hoefer. The contributions represent the state of the ...
اقرأ المزيد
Network flow optimization analyzes optimization problems on networks; hence, network optimization is reflected in many application ...
اقرأ المزيد
The book covers the different fields of learning technologies: education, psychology, computer science. The book address ...
اقرأ المزيد
Governments have known since the 1960s that smoking results in irreversible health damage. This open access book examines ...
اقرأ المزيد
This book will awaken the interest of breeders, phytopathologists, environmentalists, extension services, plant virologists, ...
اقرأ المزيد
This two-volume set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
اقرأ المزيد
This two-books set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
اقرأ المزيد
The LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...
اقرأ المزيد
This is Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; ...
اقرأ المزيد
The book is organized in topical sections on parameterized systems, model checking, applications, static analysis, concurrent/distributed ...
اقرأ المزيدThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
اقرأ المزيدThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
اقرأ المزيد
This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
اقرأ المزيد
This set of lectures collects surveys of open problems in celestial dynamics and dynamical astronomy applied to solar, extra-solar ...
اقرأ المزيد
This book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together ...
اقرأ المزيد