Covers both traditional and contemporary materials, current industry standards and new and emerging technologies. The only ...
Continue reading
This book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of ...
Continue reading
This open access brief introduces the basic principles of control theory in a concise self-study guide. It complements the ...
Continue reading
Recent evolutionary advances in information and communication technologies give rise to a new environment for Real Time Control ...
Continue readingProvides guidelines which can extend the existing standards and codes to cover these types of special works, especially those ...
Continue reading
Efforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...
Continue reading
Efforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...
Continue reading
This book constitutes the refereed proceedings of the 7th International Conference on Coordination Models and Languages, ...
Continue reading
The definitive guide to writing robust, maintainable code. Whatever version of Java you are using—up to and including Java ...
Continue reading
Creating Client Extranets with SharePoint 2003 is a guide for creating client-facing extranets using SharePoint 2003. This ...
Continue reading
Build and program MINDSTORM NXT robots with Daniele Benedettelli, one of the world's most respected NXT robot builders. ...
Continue readingInvestment platforms are challenging the grip of massive business on the venture sector and are providing new means of power ...
Continue reading
Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...
Continue reading
These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...
Continue reading
This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
Continue reading
This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second ...
Continue reading
A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
Continue reading
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
Continue reading
the first book that compiles the fruits of the studies that have been performed to date to solve the riddle ‘written’ ...
Continue reading
Data Assimilation comprehensively covers data assimilation and inverse methods, including both traditional state estimation ...
Continue reading