This book is devoted to a theory of gradient flows in spaces which are not nec- sarily endowed with a natural linear or differentiable ...
اقرأ المزيد
Devoted to a theory of gradient flows in spaces which are not necessarily endowed with a natural linear or differentiable ...
اقرأ المزيد
Shows, step-by-step, how to work through the many stages of a building construction project―from planning and material ...
اقرأ المزيد
The book reviews the debate on how best to measure period longevity. In the various chapters, leading experts in demography ...
اقرأ المزيد
Covers all areas of human–computer interaction and human factors in cybersecurity Includes information for IT specialists, ...
اقرأ المزيد
Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
اقرأ المزيد
Comprehensive coverage looks at infection control and prevention from the perspective of all dental team members. Easy-to-follow, ...
اقرأ المزيدThe management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...
اقرأ المزيد
The chapters within this volume examine those complexities using a range of traditional and nontraditional measures—such ...
اقرأ المزيد
Provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, ...
اقرأ المزيدProvides both an up-to-date overview of the field of bridge engineering and significant contributions to the process of more ...
اقرأ المزيد
This book gives a systematic presentation of modern measure theory as it has developed over the past century and offers ...
اقرأ المزيد
This book welcomes students into the fundamental theory of measure, integration, and real analysis. Focusing on an accessible ...
اقرأ المزيد
This book covers the underlying science and application issues related to aggregation operators, focusing on tools used in ...
اقرأ المزيدThis book presents a discussion on human rights-based attributes for each article pertinent to the substantive rights of ...
اقرأ المزيدThis updated and expanded second edition has been informed by a major R&D programme on offshore risk assessment in Norway ...
اقرأ المزيد
This two-volume set LNCS 12269 and LNCS 12270 constitutes the refereed proceedings of the 16th International Conference on ...
اقرأ المزيد
This two-volume set LNCS 12269 and LNCS 12270 constitutes the refereed proceedings of the 16th International Conference on ...
اقرأ المزيد
This book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...
اقرأ المزيد
Emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview ...
اقرأ المزيد