It' s important to improving the state of the art of highly depe- able computer-based systems, since then increasingly applied ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...
اقرأ المزيد
These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Computer ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 8th Asia Pacific Conference on Computer Human Interaction, APCHI 2008, ...
اقرأ المزيد
The two-volume set LNCS 12376 and 12377 constitutes the refereed proceedings of the 17th International Conference on Computers ...
اقرأ المزيد
The two-volume set LNCS 12376 and 12377 constitutes the refereed proceedings of the 17th International Conference on Computers ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 11th International Conference on Computers Helping People with Special ...
اقرأ المزيد
History based access control and secure information flow The spec# programming system Mastering test generation from smart ...
اقرأ المزيد
This book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of ...
اقرأ المزيد
This book analyzes issues in human rights law from a variety of perspectives by eminent European and Asian professors of ...
اقرأ المزيد
This open access book provides a comprehensive European perspective on the concept of ageism, its origins, the manifestation ...
اقرأ المزيد
This open access brief introduces the basic principles of control theory in a concise self-study guide. It complements the ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 5th International Conference on Cooperative Design, Visualization, ...
اقرأ المزيد
Many communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access ...
اقرأ المزيد
This book is published open access under a CC BY 3.0 IGO license. This open access book provides methods for the estimation ...
اقرأ المزيد
Higher education finances lie at the crossroads in many Western countries. On the one hand, the surging demand of the past ...
اقرأ المزيد
On the basis of an empirical study and taking a comparative as well as an economic perspective Qing-Yun Jiang analyses the ...
اقرأ المزيد
This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
اقرأ المزيد