This book contains four parts. The first part presents a further development of models of knowledge creation presented already ...
Continue readingHow do scientists use analogies and other processes to break away from old theories and generate new ones? This book documents ...
Continue readingMany new micro-theories of knowledge and technology creation have emerged in the last decade of the 20th Century and in the ...
Continue readingThe book provides an explanation for the emergence of innovation and creativity in the music industry by retelling and interpreting ...
Continue readingThis book addresses all issues relevant to error prevention and safe practice in the acute and emergency health-care setting. ...
Continue readingThis book is dedicated to advancing research, development and implementation efforts focused on infrastructure protection.
Continue readingThis book is dedicated to advancing research, development and implementation efforts focused on infrastructure protection.
Continue readingThis book explores the potential risks and vulnerabilities of the European electricity infrastructure, other infrastructures ...
Continue readingConcepts, methods and techniques of statistical physics in the study of correlated, as well as uncorrelated, phenomena are ...
Continue readingThis work takes stock of the different conceptions of fundamental value in finance, the methods of its calculation and the ...
Continue readingAn unacknowledged key feature of East Asian FTA diplomacy is the region's active cross-regional preferential trading relations. ...
Continue readingThis book argues in favour of cross-linguistic variation in sentence processing by providing empirical data from ambiguity ...
Continue readingUnveils the biggest scams and frauds that have shocked the world of cryptocurrency, from the disappearing Crypto Queen with ...
Continue readingExplores the emergence of a decentralised and disintermediated crypto-market and investigates the way in which it can transform ...
Continue readingCryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing ...
Continue readingThis book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed ...
Continue readingA rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
Continue readingThis book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
Continue readingBased on extensive archival research, this book examines the poetics and politics of the Dublin Gate Theatre (est. 1928) ...
Continue readingThe central purpose of this collection of essays is to make a creative addition to the debates surrounding the cultural heritage ...
Continue reading