This book is devoted to a theory of gradient flows in spaces which are not nec- sarily endowed with a natural linear or differentiable ...
Weiterlesen
Devoted to a theory of gradient flows in spaces which are not necessarily endowed with a natural linear or differentiable ...
Weiterlesen
Shows, step-by-step, how to work through the many stages of a building construction project―from planning and material ...
Weiterlesen
The book reviews the debate on how best to measure period longevity. In the various chapters, leading experts in demography ...
Weiterlesen
Covers all areas of human–computer interaction and human factors in cybersecurity Includes information for IT specialists, ...
Weiterlesen
Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
Weiterlesen
Comprehensive coverage looks at infection control and prevention from the perspective of all dental team members. Easy-to-follow, ...
WeiterlesenThe management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...
Weiterlesen
The chapters within this volume examine those complexities using a range of traditional and nontraditional measures—such ...
Weiterlesen
Provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, ...
WeiterlesenProvides both an up-to-date overview of the field of bridge engineering and significant contributions to the process of more ...
Weiterlesen
This book gives a systematic presentation of modern measure theory as it has developed over the past century and offers ...
Weiterlesen
This book welcomes students into the fundamental theory of measure, integration, and real analysis. Focusing on an accessible ...
Weiterlesen
This book covers the underlying science and application issues related to aggregation operators, focusing on tools used in ...
WeiterlesenThis book presents a discussion on human rights-based attributes for each article pertinent to the substantive rights of ...
WeiterlesenThis updated and expanded second edition has been informed by a major R&D programme on offshore risk assessment in Norway ...
Weiterlesen
This two-volume set LNCS 12269 and LNCS 12270 constitutes the refereed proceedings of the 16th International Conference on ...
Weiterlesen
This two-volume set LNCS 12269 and LNCS 12270 constitutes the refereed proceedings of the 16th International Conference on ...
Weiterlesen
This book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...
Weiterlesen
Emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview ...
Weiterlesen