Probabilistic techniques are increasingly being employed in computer programs and systems because they can increase efficiency ...
Continue reading
Presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, ...
Continue reading
Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations ...
Continue reading
What makes an event count as an action? Typical answers appeal to the way in which the event was produced: e.g., perhaps ...
Continue reading
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue reading
provides thought-provoking and inquisitive insights into how we can prolong the useful life of buildings by designing them ...
Continue reading
This book establishes scientific foundations for adaptive autonomous cyber systems and ultimately brings about a more secure ...
Continue reading
An overview of the field, looking at the issues and challenges involved is followed by coverage of recent trends in data ...
Continue reading
Advanced Organic Chemistry Part A provides a close look at the structural concepts and mechanistic patterns that are fundamental ...
Continue reading
Advanced Quantum Mechanics, the second volume on quantum mechanics by Franz Schwabl, discusses nonrelativistic multi-particle ...
Continue reading
Advanced Quantum Mechanics, the second volume on quantum mechanics by Franz Schwabl, discusses nonrelativistic multi-particle ...
Continue reading
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue reading
This book originates from an international workshop organized by Turkish Natural Catastrophe Insurance Pool (TCIP) in November ...
Continue reading
This book Covering data warehouses, security, model transformation, state diagrams development and model quality.
Continue reading
This book Covering data warehouses, security, model transformation, state diagrams development and model quality.
Continue reading
This book constitutes the refereed proceedings of the 26th Annual International Cryptology Conference, CRYPTO 2006, held ...
Continue reading
The book address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis.
Continue reading
The book address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis.
Continue reading
This book address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis ...
Continue reading
This book address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis ...
Continue reading