This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
Continue readingThis volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
Continue readingThis volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
Continue readingIt' s important to improving the state of the art of highly depe- able computer-based systems, since then increasingly applied ...
Continue readingIt' s important to improving the state of the art of highly depe- able computer-based systems, since then increasingly applied ...
Continue readingThis book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...
Continue readingThese proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
Continue readingThis book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Computer ...
Continue readingThis book constitutes the refereed proceedings of the 8th Asia Pacific Conference on Computer Human Interaction, APCHI 2008, ...
Continue readingThe two-volume set LNCS 12376 and 12377 constitutes the refereed proceedings of the 17th International Conference on Computers ...
Continue readingThe two-volume set LNCS 12376 and 12377 constitutes the refereed proceedings of the 17th International Conference on Computers ...
Continue readingThis book constitutes the refereed proceedings of the 11th International Conference on Computers Helping People with Special ...
Continue readingThis book discusses challenges in school improvement research and different methodological approaches that have the potential ...
Continue readingHistory based access control and secure information flow The spec# programming system Mastering test generation from smart ...
Continue readingThis book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of ...
Continue readingThis book analyzes issues in human rights law from a variety of perspectives by eminent European and Asian professors of ...
Continue readingThis book sheds light on contemporary challenges in sustainable finance, addressing two key perspectives: measurement and ...
Continue readingThis open access book provides a comprehensive European perspective on the concept of ageism, its origins, the manifestation ...
Continue readingRonald F. Duska, who began his career as a philosopher, has, over the last 30 years, established himself as one of the leading ...
Continue reading