This book is devoted to a theory of gradient flows in spaces which are not nec- sarily endowed with a natural linear or differentiable ...
WeiterlesenDevoted to a theory of gradient flows in spaces which are not necessarily endowed with a natural linear or differentiable ...
WeiterlesenShows, step-by-step, how to work through the many stages of a building construction project―from planning and material ...
WeiterlesenThe book reviews the debate on how best to measure period longevity. In the various chapters, leading experts in demography ...
WeiterlesenCovers all areas of human–computer interaction and human factors in cybersecurity Includes information for IT specialists, ...
WeiterlesenGives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
WeiterlesenComprehensive coverage looks at infection control and prevention from the perspective of all dental team members. Easy-to-follow, ...
WeiterlesenThe management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...
WeiterlesenThe chapters within this volume examine those complexities using a range of traditional and nontraditional measures—such ...
WeiterlesenProvides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, ...
WeiterlesenProvides both an up-to-date overview of the field of bridge engineering and significant contributions to the process of more ...
WeiterlesenThis book gives a systematic presentation of modern measure theory as it has developed over the past century and offers ...
WeiterlesenThis book welcomes students into the fundamental theory of measure, integration, and real analysis. Focusing on an accessible ...
WeiterlesenThis book covers the underlying science and application issues related to aggregation operators, focusing on tools used in ...
WeiterlesenThis book presents a discussion on human rights-based attributes for each article pertinent to the substantive rights of ...
WeiterlesenThis updated and expanded second edition has been informed by a major R&D programme on offshore risk assessment in Norway ...
WeiterlesenThis two-volume set LNCS 12269 and LNCS 12270 constitutes the refereed proceedings of the 16th International Conference on ...
WeiterlesenThis two-volume set LNCS 12269 and LNCS 12270 constitutes the refereed proceedings of the 16th International Conference on ...
WeiterlesenThis book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...
WeiterlesenEmphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview ...
Weiterlesen