Covers both traditional and contemporary materials, current industry standards and new and emerging technologies. The only ...
Continue readingThis book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of ...
Continue readingThis open access brief introduces the basic principles of control theory in a concise self-study guide. It complements the ...
Continue readingRecent evolutionary advances in information and communication technologies give rise to a new environment for Real Time Control ...
Continue readingProvides guidelines which can extend the existing standards and codes to cover these types of special works, especially those ...
Continue readingEfforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...
Continue readingEfforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...
Continue readingThis book constitutes the refereed proceedings of the 7th International Conference on Coordination Models and Languages, ...
Continue readingThe definitive guide to writing robust, maintainable code. Whatever version of Java you are using—up to and including Java ...
Continue readingCreating Client Extranets with SharePoint 2003 is a guide for creating client-facing extranets using SharePoint 2003. This ...
Continue readingBuild and program MINDSTORM NXT robots with Daniele Benedettelli, one of the world's most respected NXT robot builders. ...
Continue readingInvestment platforms are challenging the grip of massive business on the venture sector and are providing new means of power ...
Continue readingConstitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...
Continue readingThese are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...
Continue readingThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
Continue readingThis book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second ...
Continue readingA rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
Continue readingThis book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
Continue readingthe first book that compiles the fruits of the studies that have been performed to date to solve the riddle ‘written’ ...
Continue readingData Assimilation comprehensively covers data assimilation and inverse methods, including both traditional state estimation ...
Continue reading