The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...
Continue reading
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...
Continue reading
This book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography ...
Continue reading
This book provides the first in-depth analysis of the economics and regulation of financial privacy. It is an international ...
Continue reading
Finite Element Analysis (FEA) has been widely implemented by the automotive industry as a productivity tool for design engineers ...
Continue reading
FLEET TELEMATICS: Real-Time Management and Planning of Commercial Vehicle Operations combines wireless telematics systems ...
Continue reading
This volume collects selected contributions on the application of heterogeneous methods for managing uncertainty and imprecision ...
Continue reading
Floods are of increasing public concern world-wide due to increasing damages and unacceptably high numbers of injuries. Previous ...
Continue reading
You’ll learn how to write effective, modern Python 3 code by leveraging its best ideas. Don’t waste time bending Python ...
Continue reading
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop of the Initiative ...
Continue reading
Forecasting Oracle Performance is the first book to focus squarely on the problem of forecasting the future performance of ...
Continue reading
In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
Continue reading
In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
Continue reading
In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
Continue reading
This book has been developed as a forest inventory textbook for students and can also serve as a handbook for practical foresters. ...
Continue reading
Thepresentvolumecontainsthepost-proceedingsofthe4thInternationalWo- shop on Formal Aspects in Security and Trust (FAST2006). ...
Continue reading
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue reading
This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security ...
Continue reading
The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols ...
Continue reading
This book constitutes the thoroughly refereed and peer-reviewed outcome of the Formal Methods and Testing (FORTEST) network ...
Continue reading