The book is divided into two parts: The present volume - Part I - focuses on microscopic simulation, scaling physics, dynamic ...
WeiterlesenThis book is under a CC BY 4.0 license. This book offers a comprehensive guide, covering every important aspect of computational ...
WeiterlesenThis volume contains the final proceedings for the 2004 Computer Music Model-ing and Retrieval Symposium (CMMR 2004). CMMR ...
WeiterlesenThis book constitutes the thoroughly refereed post-proceedings of the Third International Computer Music Modeling and Retrieval ...
WeiterlesenThe conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability ...
WeiterlesenThese proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
WeiterlesenThis book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
WeiterlesenThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
WeiterlesenThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
WeiterlesenThis book shows that a conceptual design approach for spatio-temporal databases is both feasible and easy to apprehend. While ...
WeiterlesenA progress in technologies, the increasing expansion and use of digital environments lead to remarkable shifts of business ...
WeiterlesenWith an advent of technology, huge collection of digital images is formed as repositories on crime prevention, medical diagnosis, ...
WeiterlesenContractual Management offers a holistic approach to managerial decision-making based on contracts or business processes ...
WeiterlesenThis book constitutes the refereed post-workshop proceedings of the International Workshop on Coordination, Organization, ...
WeiterlesenData is the basis of the digitized economy. Industry 4.0 and digital services produce unprecedented amounts of data and enable ...
WeiterlesenDigital imaging is now available to all amateur astronomers at a reasonable price. The advent of CCDs, DSLRs and – perhaps ...
WeiterlesenThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
WeiterlesenPart 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...
WeiterlesenThis groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical ...
WeiterlesenThis book is about public open spaces, about people, and about the relationship between them and the role of technology in ...
Weiterlesen