The scope of the workshop included the following topics: – design of distributed applications – development methodologies ...
Continue readingContinuous technical developments have improved the potential of organ-based radiological diagnostics and have now also led ...
Continue readingThis volume represents the state of the art of research on scripting computer-supported collaborative learning and provides ...
Continue readingOffers a wealth of information in a handy easy-to-carry format. Containing over 250 colour photographs, artworks and tables, ...
Continue readingIn Searching for Water in the Solar System, Thérèse Encrenaz takes the reader on a journey through the Universe in search ...
Continue readingPresents actual design projects that have been implemented at various seaside locations Covers all aspects of seaside building, ...
Continue readingSecondary Metabolites in Soil Ecology focuses on the role of bacterial, fungal and plant secondary metabolites in soil ecosystems. ...
Continue readingIn March 1905, at approximately eight week intervals, the Editor of the noted German physics journal, Annalen der Physik, ...
Continue readingBiometrics is becoming increasingly common in establishments that require high security such as state security and financial ...
Continue readingWelcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
Continue reading" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...
Continue readingThis volume contains the papers presented at the 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006. ...
Continue readingThis book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN ...
Continue readingThis book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...
Continue readingThis book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social ...
Continue readingTelecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, ...
Continue readingIt will be beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme ...
Continue readingThis book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...
Continue readingcombines essential theory with "how-to" technical instruction to help you master basic techniques in dental sedation and ...
Continue readingThis book is open access under a CC BY license. Selfies, blogs and lifelogging devices help us understand ourselves, building ...
Continue reading