You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
اقرأ المزيد3DTV require the integration of a diversity of key technologies from computing to graphics, imaging to display, and signal ...
اقرأ المزيدThe thymic pathology is related to several complex congenital, non-oncological, and oncological diseases. Many of these illnesses ...
اقرأ المزيدOne of the main reasons for publishing this second edition of “T- roid Cancer” is the fact that the first edition has ...
اقرأ المزيدThyroid Cytopathology uses a simple algorithmic approach to the diagnosis of thyroid fine needle aspirations (FNA). This ...
اقرأ المزيدThis book consists of contributions given in honor of Wolfgang J.R. Hoefer. The contributions represent the state of the ...
اقرأ المزيدNetwork flow optimization analyzes optimization problems on networks; hence, network optimization is reflected in many application ...
اقرأ المزيدThe book covers the different fields of learning technologies: education, psychology, computer science. The book address ...
اقرأ المزيدGovernments have known since the 1960s that smoking results in irreversible health damage. This open access book examines ...
اقرأ المزيدThis book will awaken the interest of breeders, phytopathologists, environmentalists, extension services, plant virologists, ...
اقرأ المزيدThis two-volume set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
اقرأ المزيدThis two-books set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
اقرأ المزيدThe LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...
اقرأ المزيدThis is Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; ...
اقرأ المزيدThe book is organized in topical sections on parameterized systems, model checking, applications, static analysis, concurrent/distributed ...
اقرأ المزيدThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
اقرأ المزيدThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
اقرأ المزيدThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
اقرأ المزيدThis set of lectures collects surveys of open problems in celestial dynamics and dynamical astronomy applied to solar, extra-solar ...
اقرأ المزيدThis book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together ...
اقرأ المزيد