Governments have known since the 1960s that smoking results in irreversible health damage. This open access book examines ...
Continue readingThe LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...
Continue readingThe LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...
Continue readingThis study reviews the ways in which the owners and workers of IMEs have acquired the vocational and management skills that ...
Continue readingThis Open Access book deals with the pressing question of how to achieve transformational change that reconciles development ...
Continue readingTransformations and projections are used extensively in Computer Graphics, a field which is now a part of everyone’s lives ...
Continue readingThis book examines India’s economic development, agricultural production, and nutrition through the lens of a “Food Systems ...
Continue readingTransseries are formal objects constructed from an infinitely large variable x and the reals using infinite summation, exponentiation ...
Continue readingTrichotillomania has been described in the literature for at least a hundred years, but has only in the past decade received ...
Continue readingTopics of interest include model driven architecture, enterprise development environments, service oriented architecture, ...
Continue readingWritten for the non-specialist seeking an authoritative but accessible overview of this interdisciplinary field, True Visions ...
Continue readingThe purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...
Continue readingThis book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business ...
Continue readingThis book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...
Continue readingThis book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...
Continue readingThe book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
Continue reading“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
Continue readingConstitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, ...
Continue readingThe book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...
Continue readingA major focus of Turbo-like Codes is on high speed turbo decoding, which targets applications with data rates of several ...
Continue reading