You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
Continue readingNetwork flow optimization analyzes optimization problems on networks; hence, network optimization is reflected in many application ...
Continue readingThe book covers the different fields of learning technologies: education, psychology, computer science. The book address ...
Continue readingGovernments have known since the 1960s that smoking results in irreversible health damage. This open access book examines ...
Continue readingThis is Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; ...
Continue readingThis book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together ...
Continue readingThis book identifies the common and specific aspects of social mechanisms that generate inequalities, through comparative ...
Continue readingThis book states that the endemic societal faultlines of our times are deeply intertwined and that they confront us with ...
Continue readingThis book discusses transnational trade union cooperation in Europe – its forms, focuses, conditions, and obstacles. It ...
Continue readingTrade Unions on YouTube provides a much-needed assessment of how old social movement actors employ new social media platforms ...
Continue readingThis book begins by providing appropriate background information and then follows with an in-depth study of a few key issues ...
Continue readingThe authors investigate traffic-grooming problems in optical WDM mesh networks from various aspects. They cover static and ...
Continue readingTransactions on HiPEAC is a new journal which aims at the timely dissemination of research contributions in computer architecture ...
Continue readingThis Open Access book deals with the pressing question of how to achieve transformational change that reconciles development ...
Continue readingTrend in Neural Computation includes twenty chapters either contributed from leading experts or formed by extending well ...
Continue readingWith the rapid development of information and network technologies and market requirements, new challenges in supply chain ...
Continue readingThe purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...
Continue readingThis book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...
Continue readingThe last several years have seen significant progress on two related frontsin hardware and software design for electronic ...
Continue readingInterference determines the performance of UMTS radio networks. In order to provide good coverage and high capacity, network ...
Continue reading