The 30 full papers and 11 short papers presented were carefully reviewed and selected from 102 submissions. The conference ...
اقرأ المزيد
The European Group on Tort Law presents the results of its extensive research project, the Principles of European Tort Law. ...
اقرأ المزيد
This single volume represents an additional text for students who require background information on the immune response, ...
اقرأ المزيد
This textbook takes the reader step-by-step through the concepts of mechanics in a clear and detailed manner. Mechanics is ...
اقرأ المزيد
Features new content on 4G cellular systems, 5G cellular outlook, bandpass signals and systems, and polarization, among many ...
اقرأ المزيد
The expert information provided here serves as an invaluable building block for novel treatments of cardiovascular diseases, ...
اقرأ المزيد
Introduces the reader to the principles used in the construction of a large range of modern data communication protocols. ...
اقرأ المزيد
This book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...
اقرأ المزيد
This new textbook is for contemporary signal detection and parameter estimation courses offered at the advanced undergraduate ...
اقرأ المزيد
Presents basic concepts of signals and systems in a clear manner, based on the author’s 15+ years of teaching the undergraduate ...
اقرأ المزيد
This book provides a concise but lucid explanation and derivation of the fundamentals of spread-spectrum communication systems. Although ...
اقرأ المزيد
Provides a care-fully balanced presentation of auditing theory and practice. The approach is to integrate auditing material ...
اقرأ المزيد
This book constitutes the thoroughly refereed proceedings of the 10th International Workshop on Principles, Systems and Applications ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...
اقرأ المزيد
Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either ...
اقرأ المزيد
Constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
اقرأ المزيد
The aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal ...
اقرأ المزيد
Privacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological ...
اقرأ المزيد
Vast amounts of data are collected by service providers and system administ- tors, and are available in public information ...
اقرأ المزيد
With our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond ...
اقرأ المزيد