You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
Continue reading
Network flow optimization analyzes optimization problems on networks; hence, network optimization is reflected in many application ...
Continue reading
The book covers the different fields of learning technologies: education, psychology, computer science. The book address ...
Continue reading
Governments have known since the 1960s that smoking results in irreversible health damage. This open access book examines ...
Continue reading
This is Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; ...
Continue reading
This book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together ...
Continue reading
This book identifies the common and specific aspects of social mechanisms that generate inequalities, through comparative ...
Continue reading
This book states that the endemic societal faultlines of our times are deeply intertwined and that they confront us with ...
Continue reading
This book discusses transnational trade union cooperation in Europe – its forms, focuses, conditions, and obstacles. It ...
Continue reading
Trade Unions on YouTube provides a much-needed assessment of how old social movement actors employ new social media platforms ...
Continue reading
This book begins by providing appropriate background information and then follows with an in-depth study of a few key issues ...
Continue reading
The authors investigate traffic-grooming problems in optical WDM mesh networks from various aspects. They cover static and ...
Continue reading
Transactions on HiPEAC is a new journal which aims at the timely dissemination of research contributions in computer architecture ...
Continue readingThis Open Access book deals with the pressing question of how to achieve transformational change that reconciles development ...
Continue readingTrend in Neural Computation includes twenty chapters either contributed from leading experts or formed by extending well ...
Continue readingWith the rapid development of information and network technologies and market requirements, new challenges in supply chain ...
Continue reading
The purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...
Continue reading
This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...
Continue reading
The last several years have seen significant progress on two related frontsin hardware and software design for electronic ...
Continue reading
Interference determines the performance of UMTS radio networks. In order to provide good coverage and high capacity, network ...
Continue reading