Principles of Mathematics in Operations Research is a comprehensive survey of the mathematical concepts and principles of ...
Lee mas
Drawing on years of significant scientific advances and clinical developments, the editors of POMO III have thoroughly updated ...
Lee mas
Principles of Protein X-ray Crystallography provides the theoretical background necessary to understand how the structure ...
Lee mas
Introduces the reader to the principles used in the construction of a large range of modern data communication protocols. ...
Lee mas
This book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...
Lee mas
This volume contains the papers presented at POST 2018, the 7th Conference on Principles of Security and Trust, held April ...
Lee mas
This new textbook is for contemporary signal detection and parameter estimation courses offered at the advanced undergraduate ...
Lee mas
Presents basic concepts of signals and systems in a clear manner, based on the author’s 15+ years of teaching the undergraduate ...
Lee masEmphasizes statistical methods and how they can be applied to problems in science and engineering. The book contains many ...
Lee mas
Presents, explains and discusses the imperative new approach required to address soft issues such as leadership and managing ...
Lee mas
Principles of Spin is an introductory book for students and practicing software engineers who wish to learn Promela and Spin. ...
Lee mas
Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either ...
Lee mas
The aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal ...
Lee mas
Privacy in statistical databases is a discipline whose purpose is to provide - lutions to the con?ict between the increasing ...
Lee mas
Constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2008, held ...
Lee mas
Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the ...
Lee mas
Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...
Lee mas
With our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond ...
Lee mas
This book begins by discussing the most fundamental of the three techniques: .NET Remoting in Visual Basic .NET, which allows ...
Lee mas
This book is special, because for the first time you get an easy-to-follow set of code and design standards that addresses ...
Lee mas