This book summarizes presentations and discussions from the two-day international workshop held at UC Berkeley in March 2015, ...
Continue readingThe book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
Continue readingThis book addresses the way in which urban and urbanizing regions profoundly impact and are impacted by climate change. ...
Continue readingThe goal of this open access book is to develop an approach to clinical health care ethics that is more accessible to, and ...
Continue readingThis book is based on work from the COST Action “RESTORE - REthinking Sustainability TOwards a Regenerative Economy'', ...
Continue readingThis open access book offers new insights into the ageing-migration nexus and the nature of home. Documenting the hidden ...
Continue readingThis book provides new conceptualisations on the networks of migrants and their descendants in accessing the labour market. ...
Continue readingThe conventional approach to risk communication, based on a centralized and controlled model, has led to blatant failures ...
Continue readingRisk management is a process to assist in the decision-making. The risk management process takes the potential hazards as ...
Continue readingThis open access book surveys the frontier of scientific river research and provides examples to guide management towards ...
Continue readingThis book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly ...
Continue readingThe objective of this book is to help at-risk organizations to decipher the “safety cloud”, and to position themselves ...
Continue readingThe use of non-standard technologies such as superconductivity, cryogenics and radiofrequency pose challenges for the safe ...
Continue readingThis book addresses a wide variety of events and technologies concerning the sago palm, ranging from its botanical characteristics, ...
Continue readingA Goal of this volume is to initiate conversations among those working across the research-to-control spectrum on schistosomiasis ...
Continue readingThis book is an update of the first BACC assessment, published in 2008. It offers new and updated scientific findings in ...
Continue readingAlthough a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
Continue readingthe use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
Continue readingThis book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
Continue readingNew data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...
Continue reading