This book is devoted to a theory of gradient flows in spaces which are not nec- sarily endowed with a natural linear or differentiable ...
Continue readingDevoted to a theory of gradient flows in spaces which are not necessarily endowed with a natural linear or differentiable ...
Continue readingShows, step-by-step, how to work through the many stages of a building construction project―from planning and material ...
Continue readingThe book reviews the debate on how best to measure period longevity. In the various chapters, leading experts in demography ...
Continue readingCovers all areas of human–computer interaction and human factors in cybersecurity Includes information for IT specialists, ...
Continue readingGives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
Continue readingComprehensive coverage looks at infection control and prevention from the perspective of all dental team members. Easy-to-follow, ...
Continue readingThe management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...
Continue readingThe chapters within this volume examine those complexities using a range of traditional and nontraditional measures—such ...
Continue readingProvides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, ...
Continue readingProvides both an up-to-date overview of the field of bridge engineering and significant contributions to the process of more ...
Continue readingThis book gives a systematic presentation of modern measure theory as it has developed over the past century and offers ...
Continue readingThis book welcomes students into the fundamental theory of measure, integration, and real analysis. Focusing on an accessible ...
Continue readingThis book covers the underlying science and application issues related to aggregation operators, focusing on tools used in ...
Continue readingThis book presents a discussion on human rights-based attributes for each article pertinent to the substantive rights of ...
Continue readingThis updated and expanded second edition has been informed by a major R&D programme on offshore risk assessment in Norway ...
Continue readingThis two-volume set LNCS 12269 and LNCS 12270 constitutes the refereed proceedings of the 16th International Conference on ...
Continue readingThis two-volume set LNCS 12269 and LNCS 12270 constitutes the refereed proceedings of the 16th International Conference on ...
Continue readingThis book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...
Continue readingEmphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview ...
Continue reading