Concentrate on (nonlinear) stochastic partial differential equations (SPDE) of evolutionary type. All kinds of dynamics ...
Continue readingCustomer integration in the early innovation phase has been considered the method of choice in theory and practice. Growing ...
Continue readingSecurity systems have become an integral part of the building and large complex setups, and intervention of the computational ...
Continue readingThis textbook presents the crucial issues in software engineering using the agile approach to software development - one ...
Continue readingCopulas are functions that join multivariate distribution functions to their one-dimensional margins. The study of copulas ...
Continue readingCopulas are functions that join multivariate distribution functions to their one-dimensional margins. The study of copulas ...
Continue readingIn this revised and extended version of his course notes from a 1-year course at Scuola Normale Superiore, Pisa, the author ...
Continue readingThis book presents the key aspects of statistics in Wasserstein spaces, i.e. statistics in the space of probability measures ...
Continue readingThe two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography ...
Continue readingConsidering the stupendous gain in importance, in the banking and insurance industries since the early 1990’s, of mathematical ...
Continue readingFor cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security ...
Continue readingPresents recent advances in modelling, planning and evaluating city logistics for sustainable and liveable cities based on ...
Continue readingPresents recent advances in modelling, planning and evaluating city logistics for sustainable and liveable cities based on ...
Continue readingPresents recent advances in modelling, planning and evaluating city logistics for sustainable and liveable cities based on ...
Continue readingCommunications and Multimedia Security is an essential reference for both academic and professional researchers in the fields ...
Continue readingThis book covered methodology and seven additional tracks on ad-hoc, natural language processing, heterogeneous collection, ...
Continue readingThis book covered methodology and seven additional tracks on ad-hoc, natural language processing, heterogeneous collection, ...
Continue readingProvides an up-to-date survey of developments in computer security. Central problems that confront security designers and ...
Continue readingIntroduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...
Continue readingImportant and cost-effective innovations can substantially increase cyber risk and the loss of intellectual property, corporate ...
Continue reading