It is expected that uncovered corporate fraud negatively affects the public reputation, and financial performance of fraudulent ...
Lire la suiteObjectives of this work is to compare conventional cosmetics to biotechnology derived cosmeceuticals in terms of skin anti-aging, ...
Lire la suite
Distributed client/server architectures are the technological backbone of today’s data centres. A usage-based allocation ...
Lire la suite
This book explores the potential risks and vulnerabilities of the European electricity infrastructure, other infrastructures ...
Lire la suite
Sebastian Knoll investigates what cross-business synergies actually are and how they are realized successfully. In a first ...
Lire la suite
Based on extensive archival research, this book examines the poetics and politics of the Dublin Gate Theatre (est. 1928) ...
Lire la suite
The volume addresses a deeply political aspect of heritage preservation and management as it relates to human rights. Social ...
Lire la suite
This volume comprises papers from the following ?ve workshops that were part of the complete program for the International ...
Lire la suite
This book contains variety of subjects in modern high performance computing and its applications, such as numerical and ...
Lire la suite
Provides a comprehensive reference in large data center networking. It first summarizes the developing trend of DCNs, and ...
Lire la suite
Provides a comprehensive overview of data-driven methods for structural health monitoring (SHM) and resilience of civil engineering ...
Lire la suite
This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Data Management in ...
Lire la suite
One of the most pressing challenges is to ?nd ways of evolving database technology to cope with its new role in underpinning ...
Lire la suite
One of the most pressing challenges is to ?nd ways of evolving database technology to cope with its new role in underpinning ...
Lire la suite
The book describes the data processing at various levels: design of the time and frequency references, characterization of ...
Lire la suite
It is ideal for one/two-semester courses in Computer Networks, Data Communications, and Communications Networks in CS, CIS, ...
Lire la suite
Data Stream Mining and Resource Adaptive Computation.- Purpose Based Access Control for Privacy Protection in Database Systems.- ...
Lire la suite
This book constitutes the refereed proceedings of the 11th International Conference on Database Systems for Advanced Applications, ...
Lire la suite
This book discuss the use of and synergy between databases and XML. It provided theory and practice of XML data management ...
Lire la suite
This book discuss the use of and synergy between databases and XML. It provided theory and practice of XML data management ...
Lire la suite