This book presents new approaches for researching values as they are performed or materialized. Values have been an important ...
Continue readingIt provides the tools for effective human resource management, summarized in the following seven success factors: demographic-oriented ...
Continue readingThe book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
Continue readingThe goal of this open access book is to develop an approach to clinical health care ethics that is more accessible to, and ...
Continue readingThis book provides new conceptualisations on the networks of migrants and their descendants in accessing the labour market. ...
Continue readingThis volume contains a collection of 50 contributed papers, which were presented at the 12th International Symposium of Robotics ...
Continue readingThis 2-volume set constitutes the refereed proceedings of 1st International Conference on Robotics and Rehabilitation Intelligence, ...
Continue readingThe main idea is based on indiscernibility relations that describe indistinguishability of objects. Concepts are represented ...
Continue readingThe main idea is based on indiscernibility relations that describe indistinguishability of objects. Concepts are represented ...
Continue readingThe web framework Ruby on Rails for developing database based web applications provides a Model-View-Controller framework. ...
Continue readingRuleML 2005 also accommodated the ?rst Workshop on OWL: Experiences and Directions. Rules are widely recognized to be a major ...
Continue readingOver the last few decades, important progresses in the methods of sampling have been achieved. This book draws up an inventory ...
Continue readingScalable Hardware Verification with Symbolic Simulation presents recent advancements in symbolic simulation-based solutions ...
Continue readingThis book is organized in topical sections on applied topic maps in industry and administration, visualisation and representation ...
Continue readingThis workshop was held in September 2004, in conjunction with the 2004 IEEE/WIC/ACM International Joint Conference on Web ...
Continue readingThis book is composed of papers presented at the Conference on Scientific Computing in Electrical Engineering, which was ...
Continue readingData science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
Continue readingThis book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc ...
Continue readingExamines various topics and approaches related to the security and privacy in big data and cloud computing, where authors ...
Continue reading