This open access book is a result of the first ever study of the transformations of the higher education institutional landscape ...
Continue readingThis open access book examines the triangle between family, gender, and health in Europe from a demographic perspective. ...
Continue readingThis book takes a taxpayer's perspective to the relations taxation creates between people and their state. Larsen proposes ...
Continue readingThis book celebrates Professor Peter Marwedel's outstanding achievements in compilers, embedded systems, and cyber-physical ...
Continue readingThis book constitutes the refereed proceedings of the First International Conference of Abstract State Machines, B and Z, ...
Continue readingPresents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, ...
Continue readingAccess Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations ...
Continue readingThis book is the outcome of a Global Forum on Innovation, Intellectual Property and Access to Medicines held in December ...
Continue readingThe book offers a concise guide for librarians, helping them understand the challenges, processes and technologies involved ...
Continue readingIn that book we tried very hard not to simply list everything that we knew about the product. Instead we tried to act as ...
Continue readingThis edited volume explores the legal, economic and political context for the debate about intellectual property rights for ...
Continue readingThe sixth international conference on AD-HOC NetwOrks and Wireless was held in the city of Morelia, Michoacan State, Mexico. ...
Continue readingThe 5th International Conference on Adhoc, Mobile and Wireless Networks (Adhoc-Now 2006) was held during August 17–19, ...
Continue readingThis book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Continue readingThis book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Continue readingThis book constitutes the proceedings of the Industrial Conference on Data Mining ICDM-Leipzig was the fourth meeting in ...
Continue readingThis book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, ...
Continue readingThis Volume presents the most exciting results of the Mobile and Wireless Communication Summit, held 2007 in Budapest. It ...
Continue readingThis book presents a unique collection of practical examples from the field of pharma business management and research. ...
Continue readingThisbookcontainsthepostworkshopproceedingsofthe7thInternationalWo- shop on Knowledge Discovery from the Web, WEBKDD 2005. ...
Continue reading