As the number of thefts and identity fraud has become a serious issue and with the increase of accidents rate, and the need ...
Continue reading
This book highlights the latest advances made in the niche area of Reactive Oxygen Species and Redox processes in plants. ...
Continue reading
The use of thin films is continuously expanding. In the family of Physical Vapour Deposition techniques, sputtering is one ...
Continue reading
Public choice is the study of behavior at the intersection of economics and political science. Since the pioneering work ...
Continue reading
Managerial decision-making during the lifetime of a project can have im portant implications on project handling and its ...
Continue reading
This book presents a careful selection of the field that very well reflects the breadth of the discipline. It covers a range ...
Continue reading
This book constitutes the refereed proceedings of the 10th IFIP/IEEE International Conference on Management of Multimedia ...
Continue reading
This book focuses on core functionalities for wireless real-time multi-hop networking with TDMA (time-division multiple access) ...
Continue reading
This book explores the dataspace paradigm as a best-effort approach to data management within data ecosystems. It establishes ...
Continue reading
This volume contains the tutorial papers of the Summer School “Reasoning Web,”July25–29,2005(http://reasoningweb. org). ...
Continue reading
This book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...
Continue reading
The present book is a festschrift in honor of Luigia Carlucci Aiello. The 18 articles included are written by former students, ...
Continue reading
This book constitutes the thoroughly refereed and extended post-proceedings of the 11th Annual ERCIM International Workshop ...
Continue reading
Constitutes the extended post-proceedings of the ERCIM/CoLogNet International Workshop on Constraint Satisfaction and Constraint ...
Continue reading
This book address all aspects of constraint and logic programming, including foundational issues, implementation techniques, ...
Continue reading
The application of metaheuristics to combinatorial optimisation is an active field in which new theoretical developments, ...
Continue reading
Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. Papers cover ...
Continue reading
This book presents the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took ...
Continue reading
This book presents the proceed-ings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID2006), which took ...
Continue reading
This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Continue reading