Much has been written about the economic and political problems of countries that are in the process of changing from centrally ...
Continue readingThe book identifies the types of organizations that generate financial information and explains how you can use it for your ...
Continue readingThis book—an outgrowth of the 10th International Symposium on Dynamic Games—presents current developments of the theory ...
Continue readingImproving standards of care is a real challenge in Intensive Care Medicine. Bettering clinical performance, patient safety, ...
Continue readingThis book considers the effects of COVID-19 on accounting, particularly with regard to the role of artificial intelligence ...
Continue readingProvides advanced system implementation for Smart Cities using artificial intelligence. It addresses the complete functional ...
Continue readingAuditory Perception of Sound Sources covers higher-level auditory processes that are perceptual processes. The chapters describe ...
Continue readingThe volume includes a total of 62 invited papers, organized into 12 broad thematic areas: cochlear signal processing; brainstem ...
Continue readingProtection and Repair presents recent developments in auditory research and their potential translation to the clinical setting. ...
Continue readingThis book presents the concept of value as the central component to success and longevity of the global ICT industry player, ...
Continue readingThis book discusses the role of business models in corporate reporting. It illustrates the evolution of non-financial reporting, ...
Continue readingLearn why ethical behavior is so important and how to recognize potential pitfalls that involve much more than memorizing ...
Continue readingIncludes all the cloud-related technologies in a single platform, so that researchers, academicians, postgraduate students, ...
Continue readingHuman-Computer Interaction (HCI) lies at the crossroads of many scienti?c areas including arti?cial intelligence, computer ...
Continue readingSensory signals reach the cerebral cortex after having made synapses in different relay stations along the sensory pathway. ...
Continue readingThis book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
Continue readingThis book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
Continue readingThis volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...
Continue readingThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Continue readingThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Continue reading