This book summarizes presentations and discussions from the two-day international workshop held at UC Berkeley in March 2015, ...
اقرأ المزيدThe book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
اقرأ المزيدThis book addresses the way in which urban and urbanizing regions profoundly impact and are impacted by climate change. ...
اقرأ المزيدThe goal of this open access book is to develop an approach to clinical health care ethics that is more accessible to, and ...
اقرأ المزيدThis book is based on work from the COST Action “RESTORE - REthinking Sustainability TOwards a Regenerative Economy'', ...
اقرأ المزيدThis open access book offers new insights into the ageing-migration nexus and the nature of home. Documenting the hidden ...
اقرأ المزيدThis book provides new conceptualisations on the networks of migrants and their descendants in accessing the labour market. ...
اقرأ المزيدThe conventional approach to risk communication, based on a centralized and controlled model, has led to blatant failures ...
اقرأ المزيدRisk management is a process to assist in the decision-making. The risk management process takes the potential hazards as ...
اقرأ المزيدThis open access book surveys the frontier of scientific river research and provides examples to guide management towards ...
اقرأ المزيدThis book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly ...
اقرأ المزيدThe objective of this book is to help at-risk organizations to decipher the “safety cloud”, and to position themselves ...
اقرأ المزيدThe use of non-standard technologies such as superconductivity, cryogenics and radiofrequency pose challenges for the safe ...
اقرأ المزيدThis book addresses a wide variety of events and technologies concerning the sago palm, ranging from its botanical characteristics, ...
اقرأ المزيدA Goal of this volume is to initiate conversations among those working across the research-to-control spectrum on schistosomiasis ...
اقرأ المزيدThis book is an update of the first BACC assessment, published in 2008. It offers new and updated scientific findings in ...
اقرأ المزيدAlthough a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
اقرأ المزيدthe use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
اقرأ المزيدThis book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
اقرأ المزيدNew data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...
اقرأ المزيد