This book contains four parts. The first part presents a further development of models of knowledge creation presented already ...
اقرأ المزيد
How do scientists use analogies and other processes to break away from old theories and generate new ones? This book documents ...
اقرأ المزيد
Many new micro-theories of knowledge and technology creation have emerged in the last decade of the 20th Century and in the ...
اقرأ المزيد
The book provides an explanation for the emergence of innovation and creativity in the music industry by retelling and interpreting ...
اقرأ المزيد
This book addresses all issues relevant to error prevention and safe practice in the acute and emergency health-care setting. ...
اقرأ المزيد
This book is dedicated to advancing research, development and implementation efforts focused on infrastructure protection.
اقرأ المزيد
This book is dedicated to advancing research, development and implementation efforts focused on infrastructure protection.
اقرأ المزيد
This book explores the potential risks and vulnerabilities of the European electricity infrastructure, other infrastructures ...
اقرأ المزيد
Concepts, methods and techniques of statistical physics in the study of correlated, as well as uncorrelated, phenomena are ...
اقرأ المزيد
This work takes stock of the different conceptions of fundamental value in finance, the methods of its calculation and the ...
اقرأ المزيد
An unacknowledged key feature of East Asian FTA diplomacy is the region's active cross-regional preferential trading relations. ...
اقرأ المزيد
This book argues in favour of cross-linguistic variation in sentence processing by providing empirical data from ambiguity ...
اقرأ المزيد
Unveils the biggest scams and frauds that have shocked the world of cryptocurrency, from the disappearing Crypto Queen with ...
اقرأ المزيد
Explores the emergence of a decentralised and disintermediated crypto-market and investigates the way in which it can transform ...
اقرأ المزيد
CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing ...
اقرأ المزيد
This book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed ...
اقرأ المزيد
A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيد
Based on extensive archival research, this book examines the poetics and politics of the Dublin Gate Theatre (est. 1928) ...
اقرأ المزيدThe central purpose of this collection of essays is to make a creative addition to the debates surrounding the cultural heritage ...
اقرأ المزيد