The conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability ...
Continue reading
This book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...
Continue reading
This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...
Continue reading
Manufacturing systems and processes are becoming increasingly complex, making more rational decision-making in process control ...
Continue reading
This practical and greatly expanded edition by media and public relations veteran Colin Doeg focuses on the communications ...
Continue reading
This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
Continue reading
This book contains variety of subjects in modern high performance computing and its applications, such as numerical and ...
Continue reading
This volume is one of the very few publications dedicated to the challenges that Continental philosophy poses to the field ...
Continue readingTechnical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating ...
Continue reading
This book constitutes the refereed proceedings of the First International Conference on Data Management in Grid and Peer-to-Peer ...
Continue reading
This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Data Management in ...
Continue reading
For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting ...
Continue reading
This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
Continue reading
This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
Continue reading
This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...
Continue reading
Contains the proceedings of the 'Second Latin-American Symposium' on Dependable Computing, LADC 2005. This book comprises ...
Continue reading
This book is for scientists and experts who work on urban food policies. It provides a conceptual framework for understanding ...
Continue reading
The book examines the methodological challenges in analyzing the effectiveness of development policies. It presents a selection ...
Continue reading
This book presented similarity search, architectures, personalization, interoperability, evaluation, miscellaneous, preservation, ...
Continue reading
This book presented similarity search, architectures, personalization, interoperability, evaluation, miscellaneous, preservation, ...
Continue reading