It is expected that uncovered corporate fraud negatively affects the public reputation, and financial performance of fraudulent ...
WeiterlesenObjectives of this work is to compare conventional cosmetics to biotechnology derived cosmeceuticals in terms of skin anti-aging, ...
Weiterlesen
Distributed client/server architectures are the technological backbone of today’s data centres. A usage-based allocation ...
Weiterlesen
This book explores the potential risks and vulnerabilities of the European electricity infrastructure, other infrastructures ...
Weiterlesen
Sebastian Knoll investigates what cross-business synergies actually are and how they are realized successfully. In a first ...
Weiterlesen
Based on extensive archival research, this book examines the poetics and politics of the Dublin Gate Theatre (est. 1928) ...
Weiterlesen
The volume addresses a deeply political aspect of heritage preservation and management as it relates to human rights. Social ...
Weiterlesen
This volume comprises papers from the following ?ve workshops that were part of the complete program for the International ...
Weiterlesen
This book contains variety of subjects in modern high performance computing and its applications, such as numerical and ...
Weiterlesen
Provides a comprehensive reference in large data center networking. It first summarizes the developing trend of DCNs, and ...
Weiterlesen
Provides a comprehensive overview of data-driven methods for structural health monitoring (SHM) and resilience of civil engineering ...
Weiterlesen
This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Data Management in ...
Weiterlesen
One of the most pressing challenges is to ?nd ways of evolving database technology to cope with its new role in underpinning ...
Weiterlesen
One of the most pressing challenges is to ?nd ways of evolving database technology to cope with its new role in underpinning ...
Weiterlesen
The book describes the data processing at various levels: design of the time and frequency references, characterization of ...
Weiterlesen
It is ideal for one/two-semester courses in Computer Networks, Data Communications, and Communications Networks in CS, CIS, ...
Weiterlesen
Data Stream Mining and Resource Adaptive Computation.- Purpose Based Access Control for Privacy Protection in Database Systems.- ...
Weiterlesen
This book constitutes the refereed proceedings of the 11th International Conference on Database Systems for Advanced Applications, ...
Weiterlesen
This book discuss the use of and synergy between databases and XML. It provided theory and practice of XML data management ...
Weiterlesen
This book discuss the use of and synergy between databases and XML. It provided theory and practice of XML data management ...
Weiterlesen