As the characteristic dimensions of electronic devices continue to shrink, the ability to characterize their electronic properties ...
Continue readingVisual notations and languages continue to play a pivotal role ˆ in the design of complex software systems. In many cases ...
Continue readingDetails the expanding field of porcelain laminate veneers in aesthetic dentistry. It guides the aesthetic dentist in understanding ...
Continue readingNew forms of imaging in science have nearly always led to major advances, especially at the nanoscale, and the pace of these ...
Continue readingThe scope of the workshop included the following topics: – design of distributed applications – development methodologies ...
Continue readingThe present book on Sclerotinia deals with the aspects on taxonomy, nomenclature, geographical distribution, economic importance, ...
Continue readingThe first part of "Screw Compressors" gives a review of recent developments in screw compressor design.The second part ...
Continue readingSecondary Metabolites in Soil Ecology focuses on the role of bacterial, fungal and plant secondary metabolites in soil ecosystems. ...
Continue readingAlthough a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
Continue readingData science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
Continue readingThis book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over ...
Continue readingThe present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
Continue readingThis book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...
Continue readingThis book about the ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with ...
Continue readingSecurity for Wireless Sensor Networks discusses fundamental security issues in wireless sensor networks, techniques for the ...
Continue readingNoisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...
Continue readingIn the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect ...
Continue readingcombines essential theory with "how-to" technical instruction to help you master basic techniques in dental sedation and ...
Continue readingIn the ten chapters of this book, a broad set of practical process knowledge is p- sented, comprising simulation techniques, ...
Continue readingSeismic Retrofit of Existing Reinforced Concrete Buildings readers will also find: Detailed treatment of each available strengthening ...
Continue reading