The book explains the security architecture model and the practice of building data sharing from the blockchain infrastructure, ...
WeiterlesenBlockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger ...
WeiterlesenWhile the problems of long-term stability and biocompatibility are being addressed, several promising prototypes are starting ...
WeiterlesenThis book argues that this standard image of the great German philosopher is radically wrong. Not only does Kant reflect ...
WeiterlesenThe ability of stem cells to acquire different desired phenotypes has opened the door for a new discipline: regenerative ...
WeiterlesenTissue engineering is gaining interest as it is applied for regeneration of organs to attain their lost function. Although ...
WeiterlesenThis book constitutes the refereed proceedings of the 21st IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE ...
Weiterlesenthis book analyses patterns of internationalisation comprising the national and supranational level, the level of higher ...
WeiterlesenBorders, Mobility and Technologies of Control provides a model of criminological inquiry that is global in scope, constructionist ...
WeiterlesenThis book uses Pierre Bourdieu’s field theory as a lens through which to examine military operations. Novel in its approach, ...
WeiterlesenThere are several crucial feedbacks from forests to the climate system. The mechanisms for those feedbacks are elaborated ...
WeiterlesenThis volume adopts an ecosystems approach to understanding the world's boreal peatlands. It focuses on biogeochemical patterns ...
WeiterlesenThe book considers the diverse experiences of urban and rural families before the war and the effects of the timing of their ...
WeiterlesenBotanicals, which have been part of human food and medicine for thousands of years, are perceived as being safer than synthetic ...
WeiterlesenThis easy-to-use book helps you acquire a wealth of fascinating information about plants. There are 130 pages with text, ...
WeiterlesenBotnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based ...
WeiterlesenThe book is the result of intensive work of 43 authors, all of them leading scientists in the Botrytis sciences. New technologies ...
WeiterlesenBoundary representation is the principle solid modelling method used in modern CAD/CAM systems. There have been a long series ...
WeiterlesenThe book is rich in references and leaves no aspect of the problem untouched. The morphological, pharmacological, physiological ...
WeiterlesenThis text is intended to provide an overview of brain death. The topics explored in this book are the concept and historical ...
Weiterlesen