The conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability ...
Continue readingThis book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...
Continue readingThis book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...
Continue readingManufacturing systems and processes are becoming increasingly complex, making more rational decision-making in process control ...
Continue readingThis practical and greatly expanded edition by media and public relations veteran Colin Doeg focuses on the communications ...
Continue readingThis volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
Continue readingThis book contains variety of subjects in modern high performance computing and its applications, such as numerical and ...
Continue readingThis volume is one of the very few publications dedicated to the challenges that Continental philosophy poses to the field ...
Continue readingTechnical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating ...
Continue readingThis book constitutes the refereed proceedings of the First International Conference on Data Management in Grid and Peer-to-Peer ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Data Management in ...
Continue readingFor 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting ...
Continue readingThis book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
Continue readingThis book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
Continue readingThis volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...
Continue readingContains the proceedings of the 'Second Latin-American Symposium' on Dependable Computing, LADC 2005. This book comprises ...
Continue readingThis book is for scientists and experts who work on urban food policies. It provides a conceptual framework for understanding ...
Continue readingThe book examines the methodological challenges in analyzing the effectiveness of development policies. It presents a selection ...
Continue readingThis book presented similarity search, architectures, personalization, interoperability, evaluation, miscellaneous, preservation, ...
Continue readingThis book presented similarity search, architectures, personalization, interoperability, evaluation, miscellaneous, preservation, ...
Continue reading