This volume contains contributions from international experts in the fields of constructive approximation. This area has ...
Continue readingInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Continue readingThis book addresses postgraduate students and scientists working in engineering, physics, and mathematics. It provides an ...
Continue readingTopics of interest include model driven architecture, enterprise development environments, service oriented architecture, ...
Continue readingVsevolod Alekseevich Solonnikov is known as one of the outstanding mathematicians from the St Petersburg Mathematical School. ...
Continue readingResearch in tropical forestry is confronted with the task of finding strategies to alleviate pressure on remaining forests ...
Continue readingThis book presents a concise overview of genetic variation, evolutionary processes and the human impact on forest genetic ...
Continue readingThe book aims at dealing with all practical issues in connection with practical tree seed procurement and supply in tropical ...
Continue readingIn the past, many tropical and parasitic infections were confined to tropical areas of the world located between the Tropic ...
Continue readingWritten for the non-specialist seeking an authoritative but accessible overview of this interdisciplinary field, True Visions ...
Continue readingThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue readingThe volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
Continue readingMarco Tulio Zanini examines the effects of different industry-specific institutional framework constraints on the level of ...
Continue readingThis book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...
Continue readingThe book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
Continue reading“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
Continue readingThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Continue readingThe book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...
Continue readingTsunami: The Underrated Hazard, 2nd Edition, comprehensively describes the nature and process of tsunami formation, outlines ...
Continue readingThis volume contains 20 contributions of leading scientists mostly presented at the 22nd International Tsunami Symposium ...
Continue reading