This book summarizes presentations and discussions from the two-day international workshop held at UC Berkeley in March 2015, ...
Lee masThe book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
Lee masThis book addresses the way in which urban and urbanizing regions profoundly impact and are impacted by climate change. ...
Lee masThe goal of this open access book is to develop an approach to clinical health care ethics that is more accessible to, and ...
Lee masThis book is based on work from the COST Action “RESTORE - REthinking Sustainability TOwards a Regenerative Economy'', ...
Lee masThis open access book offers new insights into the ageing-migration nexus and the nature of home. Documenting the hidden ...
Lee masThis book provides new conceptualisations on the networks of migrants and their descendants in accessing the labour market. ...
Lee masThe conventional approach to risk communication, based on a centralized and controlled model, has led to blatant failures ...
Lee masRisk management is a process to assist in the decision-making. The risk management process takes the potential hazards as ...
Lee masThis open access book surveys the frontier of scientific river research and provides examples to guide management towards ...
Lee masThis book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly ...
Lee masThe objective of this book is to help at-risk organizations to decipher the “safety cloud”, and to position themselves ...
Lee masThe use of non-standard technologies such as superconductivity, cryogenics and radiofrequency pose challenges for the safe ...
Lee masThis book addresses a wide variety of events and technologies concerning the sago palm, ranging from its botanical characteristics, ...
Lee masA Goal of this volume is to initiate conversations among those working across the research-to-control spectrum on schistosomiasis ...
Lee masThis book is an update of the first BACC assessment, published in 2008. It offers new and updated scientific findings in ...
Lee masAlthough a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
Lee masthe use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
Lee masThis book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
Lee masNew data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...
Lee mas