The book explains the security architecture model and the practice of building data sharing from the blockchain infrastructure, ...
اقرأ المزيدBlockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger ...
اقرأ المزيدWhile the problems of long-term stability and biocompatibility are being addressed, several promising prototypes are starting ...
اقرأ المزيدThis book argues that this standard image of the great German philosopher is radically wrong. Not only does Kant reflect ...
اقرأ المزيدThe ability of stem cells to acquire different desired phenotypes has opened the door for a new discipline: regenerative ...
اقرأ المزيدTissue engineering is gaining interest as it is applied for regeneration of organs to attain their lost function. Although ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 21st IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE ...
اقرأ المزيدthis book analyses patterns of internationalisation comprising the national and supranational level, the level of higher ...
اقرأ المزيدBorders, Mobility and Technologies of Control provides a model of criminological inquiry that is global in scope, constructionist ...
اقرأ المزيدThis book uses Pierre Bourdieu’s field theory as a lens through which to examine military operations. Novel in its approach, ...
اقرأ المزيدThere are several crucial feedbacks from forests to the climate system. The mechanisms for those feedbacks are elaborated ...
اقرأ المزيدThis volume adopts an ecosystems approach to understanding the world's boreal peatlands. It focuses on biogeochemical patterns ...
اقرأ المزيدThe book considers the diverse experiences of urban and rural families before the war and the effects of the timing of their ...
اقرأ المزيدBotanicals, which have been part of human food and medicine for thousands of years, are perceived as being safer than synthetic ...
اقرأ المزيدThis easy-to-use book helps you acquire a wealth of fascinating information about plants. There are 130 pages with text, ...
اقرأ المزيدBotnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based ...
اقرأ المزيدThe book is the result of intensive work of 43 authors, all of them leading scientists in the Botrytis sciences. New technologies ...
اقرأ المزيدBoundary representation is the principle solid modelling method used in modern CAD/CAM systems. There have been a long series ...
اقرأ المزيدThe book is rich in references and leaves no aspect of the problem untouched. The morphological, pharmacological, physiological ...
اقرأ المزيدThis text is intended to provide an overview of brain death. The topics explored in this book are the concept and historical ...
اقرأ المزيد