This cutting edge text considers how Asian philanthropists and charitable organizations break with Western philanthropic ...
اقرأ المزيدTim Friehe analyzes important aspects for the design of tort law which intends to induce optimal individual choices and possible ...
اقرأ المزيدPredation is considered one of the distinct phenomena related to the interrelationships between species on the Earth. There ...
اقرأ المزيدThis volume contains chapters on the diversity, ecology and phylogeny of predatory prokaryotes, introducing models of predator–prey ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 14th International Conference on Principles and Practice of Constraint ...
اقرأ المزيدPrinciples of Bacterial Detection: Biosensors, Recognition Receptors and Microsystems will cover the up-to-date biosensor ...
اقرأ المزيدThis book explains and explores the principal techniques of Data Mining: for classification, generation of association rules ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 11th International Conference on Principles of Distributed Systems, ...
اقرأ المزيدA collection of papers organized in topical sections on design of distributed systems, ad-hoc networks and mobile agents, ...
اقرأ المزيدThis book constitutes the refereed post-proceedings of the 9th International Conference on Principles of Distributed Systems, ...
اقرأ المزيدThe 30 full papers and 11 short papers presented were carefully reviewed and selected from 102 submissions. The conference ...
اقرأ المزيدThis book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...
اقرأ المزيدThis volume contains the papers presented at POST 2018, the 7th Conference on Principles of Security and Trust, held April ...
اقرأ المزيدThis book constitutes the thoroughly refereed proceedings of the 10th International Workshop on Principles, Systems and Applications ...
اقرأ المزيدConstitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2008, held ...
اقرأ المزيدVast amounts of data are collected by service providers and system administ- tors, and are available in public information ...
اقرأ المزيدPrivacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...
اقرأ المزيدExamining the efficiency of exits, this book offers recommendations and guidelines for an integrated and exit-oriented private ...
اقرأ المزيدA comprehensive guide to privileged structures and their application in the discovery of new drugs The use of privileged ...
اقرأ المزيدASP.NET 3.5 is Microsoft's revolutionary ASP.NET technology. It is the principal standard for creating dynamic web pages ...
اقرأ المزيد