The lives of people all around the world, especially in industrialized nations, continue to be changed by the presence and ...
Continue readingCovering the development of field computation in the past forty years, Field Models in Electricity and Magnetism intends ...
Continue readingSoftware systems involve autonomous and distributed software components that have to execute and interact in open and dynamic ...
Continue readingFieldwork for Design looks at why ethnographic approaches have been turned to in the design of computing devices for the ...
Continue readingFieldwork for Design looks at why ethnographic approaches have been turned to in the design of computing devices for the ...
Continue readingIncludes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
Continue readingThe scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue readingThe scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue readingThis book presents the position that the online environment is a significant and relevant theater of activity in the fight ...
Continue readingThe first is Bitcoin that infamously pursues a state-independent, decentralized conception of money. The second is Finance ...
Continue readingConstitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...
Continue readingThis book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
Continue readingThis book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
Continue readingThe 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...
Continue readingThis book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography ...
Continue readingThis book demonstrates the application of simulation modelling and network analysis techniques. The book shows the added ...
Continue readingThe FPGA technology is defined, which includes architecture, logic block structure, interconnect, and configuration methods ...
Continue readingThis easy-to-read book introduces the basics of solving partial differential equations by means of finite difference methods. ...
Continue reading