The focus of this book is on filtering for linear processes, and its primary goal is to design filters from a class of linear ...
Continue readingProvides an introduction to the fundamentals of operational and strategic controlling. It conveys the central tasks and functions ...
Continue readingThe 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...
Continue readingThis book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography ...
Continue readingThis book provides the first in-depth analysis of the economics and regulation of financial privacy. It is an international ...
Continue readingFinite Element Analysis (FEA) has been widely implemented by the automotive industry as a productivity tool for design engineers ...
Continue readingThis book explores the histories and geographies of fishing in North Korea and the surrounding nations.
Continue readingFLEET TELEMATICS: Real-Time Management and Planning of Commercial Vehicle Operations combines wireless telematics systems ...
Continue readingThis volume collects selected contributions on the application of heterogeneous methods for managing uncertainty and imprecision ...
Continue readingFloods are of increasing public concern world-wide due to increasing damages and unacceptably high numbers of injuries. Previous ...
Continue readingYou’ll learn how to write effective, modern Python 3 code by leveraging its best ideas. Don’t waste time bending Python ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop of the Initiative ...
Continue readingForecasting Oracle Performance is the first book to focus squarely on the problem of forecasting the future performance of ...
Continue readingIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
Continue readingIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
Continue readingIn the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
Continue readingThis book has been developed as a forest inventory textbook for students and can also serve as a handbook for practical foresters. ...
Continue readingThepresentvolumecontainsthepost-proceedingsofthe4thInternationalWo- shop on Formal Aspects in Security and Trust (FAST2006). ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue reading