This book provides an ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions ...
Continue readingThis book describes the interdisciplinary work of USAID’s Famine Early Warning System Network (FEWS NET) and its in uence ...
Continue readingFast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...
Continue readingThe aim of this book is to take stock of, critically engage, and celebrate feminist IR scholarship produced in Europe. Organized ...
Continue readingThe scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue readingThe scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue readingThis book presents the position that the online environment is a significant and relevant theater of activity in the fight ...
Continue readingThis book summarizes in detail the contemporary knowledge of filoviruses and diseases they cause. Almost the entirety of ...
Continue readingThis book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
Continue readingThis book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...
Continue readingThis book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography ...
Continue readingPhilipp Jostarndt analyzes the anatomy of financial distress for a large sample of German corporations. He studies distress-induced ...
Continue readingCombines theoretical and commercial perspectives informed by the author's professional experience and academic research Thoroughly ...
Continue readingThis book provides fresh insights into concepts, methods and new research findings on the causes of excessive food price ...
Continue readingThepresentvolumecontainsthepost-proceedingsofthe4thInternationalWo- shop on Formal Aspects in Security and Trust (FAST2006). ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security ...
Continue readingThe author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols ...
Continue readingThis volume contains papers presented at the 7th International Conference on Formal Engineering Methods (ICFEM 2005), 1-4 ...
Continue reading