In this volume the methodological aspects of the scenario logic and probabilistic (LP) non-success risk management are considered. ...
Lee masThis book on scheduling covers theoretical models as well as scheduling problems in the real world. The book consists of ...
Lee masThis book describes the enormous capabilities of ALMA, the state of the project, and most notably the scientific prospects ...
Lee masThis book presents cutting-edge research results on the application of chaos theory, parametric and non-parametric statistics ...
Lee masIn this book, Craig Dilworth answers all the questions raised by the incommensurability thesis. Logical empiricism cannot ...
Lee masThis book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...
Lee masIn March 1905, at approximately eight week intervals, the Editor of the noted German physics journal, Annalen der Physik, ...
Lee masData science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
Lee masThe present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
Lee masBiometrics is becoming increasingly common in establishments that require high security such as state security and financial ...
Lee masThis book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN ...
Lee masInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Lee masThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lee masTelecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, ...
Lee masThis book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...
Lee masNoisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...
Lee mascombines essential theory with "how-to" technical instruction to help you master basic techniques in dental sedation and ...
Lee masThis book updates the theory of sediment transport, e. g. , using new representations for flow separations, and coherent ...
Lee masOver the past several decades, the territory of preserver problems has been continuously enlarging within the frame of linear ...
Lee masA major challenge in the modeling and simulation of tumor growth is the mathematical description of living matter, which ...
Lee mas