You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
Weiterlesen3DTV require the integration of a diversity of key technologies from computing to graphics, imaging to display, and signal ...
WeiterlesenThe thymic pathology is related to several complex congenital, non-oncological, and oncological diseases. Many of these illnesses ...
WeiterlesenOne of the main reasons for publishing this second edition of “T- roid Cancer” is the fact that the first edition has ...
WeiterlesenThyroid Cytopathology uses a simple algorithmic approach to the diagnosis of thyroid fine needle aspirations (FNA). This ...
WeiterlesenThis book consists of contributions given in honor of Wolfgang J.R. Hoefer. The contributions represent the state of the ...
WeiterlesenNetwork flow optimization analyzes optimization problems on networks; hence, network optimization is reflected in many application ...
WeiterlesenThe book covers the different fields of learning technologies: education, psychology, computer science. The book address ...
WeiterlesenGovernments have known since the 1960s that smoking results in irreversible health damage. This open access book examines ...
WeiterlesenThis book will awaken the interest of breeders, phytopathologists, environmentalists, extension services, plant virologists, ...
WeiterlesenThis two-volume set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
WeiterlesenThis two-books set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
WeiterlesenThe LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...
WeiterlesenThis is Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; ...
WeiterlesenThe book is organized in topical sections on parameterized systems, model checking, applications, static analysis, concurrent/distributed ...
WeiterlesenThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
WeiterlesenThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
WeiterlesenThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
WeiterlesenThis set of lectures collects surveys of open problems in celestial dynamics and dynamical astronomy applied to solar, extra-solar ...
WeiterlesenThis book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together ...
Weiterlesen