The scope of the workshop included the following topics: – design of distributed applications – development methodologies ...
Continue reading
Continuous technical developments have improved the potential of organ-based radiological diagnostics and have now also led ...
Continue reading
This volume represents the state of the art of research on scripting computer-supported collaborative learning and provides ...
Continue reading
Offers a wealth of information in a handy easy-to-carry format. Containing over 250 colour photographs, artworks and tables, ...
Continue readingIn Searching for Water in the Solar System, Thérèse Encrenaz takes the reader on a journey through the Universe in search ...
Continue reading
Presents actual design projects that have been implemented at various seaside locations Covers all aspects of seaside building, ...
Continue reading
Secondary Metabolites in Soil Ecology focuses on the role of bacterial, fungal and plant secondary metabolites in soil ecosystems. ...
Continue reading
In March 1905, at approximately eight week intervals, the Editor of the noted German physics journal, Annalen der Physik, ...
Continue reading
Biometrics is becoming increasingly common in establishments that require high security such as state security and financial ...
Continue reading
Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
Continue reading
" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...
Continue reading
This volume contains the papers presented at the 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. ...
Continue reading
This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN ...
Continue reading
This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...
Continue reading
This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social ...
Continue reading
Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, ...
Continue reading
It will be beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme ...
Continue reading
This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...
Continue reading
combines essential theory with "how-to" technical instruction to help you master basic techniques in dental sedation and ...
Continue readingThis book is open access under a CC BY license. Selfies, blogs and lifelogging devices help us understand ourselves, building ...
Continue reading