This book is devoted to a theory of gradient flows in spaces which are not nec- sarily endowed with a natural linear or differentiable ...
Continue reading
Devoted to a theory of gradient flows in spaces which are not necessarily endowed with a natural linear or differentiable ...
Continue reading
Shows, step-by-step, how to work through the many stages of a building construction project―from planning and material ...
Continue reading
The book reviews the debate on how best to measure period longevity. In the various chapters, leading experts in demography ...
Continue reading
Covers all areas of human–computer interaction and human factors in cybersecurity Includes information for IT specialists, ...
Continue reading
Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
Continue reading
Comprehensive coverage looks at infection control and prevention from the perspective of all dental team members. Easy-to-follow, ...
Continue readingThe management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...
Continue reading
The chapters within this volume examine those complexities using a range of traditional and nontraditional measures—such ...
Continue reading
Provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, ...
Continue readingProvides both an up-to-date overview of the field of bridge engineering and significant contributions to the process of more ...
Continue reading
This book gives a systematic presentation of modern measure theory as it has developed over the past century and offers ...
Continue reading
This book welcomes students into the fundamental theory of measure, integration, and real analysis. Focusing on an accessible ...
Continue reading
This book covers the underlying science and application issues related to aggregation operators, focusing on tools used in ...
Continue readingThis book presents a discussion on human rights-based attributes for each article pertinent to the substantive rights of ...
Continue readingThis updated and expanded second edition has been informed by a major R&D programme on offshore risk assessment in Norway ...
Continue reading
This two-volume set LNCS 12269 and LNCS 12270 constitutes the refereed proceedings of the 16th International Conference on ...
Continue reading
This two-volume set LNCS 12269 and LNCS 12270 constitutes the refereed proceedings of the 16th International Conference on ...
Continue reading
This book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...
Continue reading
Emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview ...
Continue reading