Describes the principles and requirements for safety, serviceability and durability of concrete bridges. This Designers' ...
Continue readingThe nature of the loading must first be understood before applying the structural engineering principles set out in the Eurocodes. ...
Continue readingProvides comprehensive guidance in the form of design aids, indications for the most convenient design procedures and worked ...
Continue readingProvides comprehensive guidance in the form of design aids, indications for the most convenient design procedures and worked ...
Continue readingDesigning Embedded Processors examines the many ways in which processor based systems are designed to allow low power devices. ...
Continue readingThis book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
Continue readingThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
Continue readingField-Programmable Gate Arrays (FPGAs) are revolutionizing digital signal processing as novel FPGA families are replacing ...
Continue readingDelivers a comprehensive and insightful examination of how architects and other design professionals can best use digital ...
Continue readingThe book presents new material and theory as well as synthesis of recent work with complete Project Designs using industry ...
Continue readingWe are delighted to welcome the attendees of the Fourth International Wo- shop on Digital Watermarking (IWDW). Watermarking ...
Continue readingThis volume celebrates the first decade of the Computer Algebra system Magma. With a design based on the ontology and semantics ...
Continue readingThis volume celebrates the first decade of the Computer Algebra system Magma. With a design based on the ontology and semantics ...
Continue readingVoting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
Continue readingVoting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
Continue readingThis book contains fields of e-business and telecommunication networks, including aspects related to security, wireless systems, ...
Continue readingThis book contains fields of e-business and telecommunication networks, including aspects related to security, wireless systems, ...
Continue readingThis book describes the principles of working with soil as a construction material, including two basic ways of treating ...
Continue readingThe book introduces innovative models and algorithms for the evaluation of WCDMA/UMTS network performance. The author established ...
Continue readingthe author also explains the uses and rationale behind a plethora of technologies, most notably several industry-standard ...
Continue reading