Recent advances in trauma treatment, coupled with ongoing traumatic world events, point to a critical need for global standards ...
Continue readingCryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing ...
Continue readingThis book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed ...
Continue readingThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
Continue readingA rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
Continue readingThis book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
Continue readingThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
Continue readingThe volume addresses a deeply political aspect of heritage preservation and management as it relates to human rights. Social ...
Continue readingMultimodal treatment lies at the heart of the improvement in cancer cure rates. However, the more aggressive the treatment ...
Continue readingThe book opens with papers on the evolutionary significance of bioerosion, and subsequently ventures out to explore the remarkable ...
Continue readingThis volume represents a collection of topics on natural killer cells, mast cells, phagocytes, toll like receptors, complement, ...
Continue readingThis book constitutes the thoroughly refereed joint post-proceedings of nine workshops held as part of the 10th International ...
Continue readingThis book contains variety of subjects in modern high performance computing and its applications, such as numerical and ...
Continue readingThis survey on the modernity of ethnomathematics addresses numerous themes related to both ethnomathematics and mathematics ...
Continue readingThis book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...
Continue readingIn this concise yet comprehensive textbook, future inventors are introduced to the key concepts of Cyber-Physical Systems ...
Continue readingCovers the various aspects associated with Cyber-Physical Systems (CPS) such as algorithms, application areas, and the improvement ...
Continue readingThis book is, perhaps, the first attempt to present a unified exposition of the subject and methodology of cybernetical physics ...
Continue readingThis book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by ...
Continue readingThis book provides new insight into Markovian dependence via the cycle decompositions. It presents a systematic account of ...
Continue reading