The book represents a snapshot of the current status of research in reaction dynamics, focusing especially on accurate time-dependent ...
Continue readingThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Continue readingThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Continue readingThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Continue readingThis book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in ...
Continue readingThe papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...
Continue readingYou'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
Continue readingOffers in a single resource the whole coverage of different diseases and lesions, congenital or acquired, of the tongue, ...
Continue readingThe LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...
Continue readingThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
Continue readingThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
Continue readingMore than ten years after its discovery, still relatively little is known about the top quark, the heaviest known elementary ...
Continue readingThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Continue readingThis book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...
Continue readingThis book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...
Continue readingThe central theme of this book is the restoration of Poincaré duality, on stratified singular spaces by using Verdier-self-dual ...
Continue readingThis book brings together scholars in the fields of management, public policy, regional studies, and organization theory ...
Continue readingThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue readingThis book states that the endemic societal faultlines of our times are deeply intertwined and that they confront us with ...
Continue readingThis volume includes adaption/monitoring, model driven architecture, network services, service oriented architecture, business ...
Continue reading