You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
Lire la suite3DTV require the integration of a diversity of key technologies from computing to graphics, imaging to display, and signal ...
Lire la suiteThe thymic pathology is related to several complex congenital, non-oncological, and oncological diseases. Many of these illnesses ...
Lire la suiteOne of the main reasons for publishing this second edition of “T- roid Cancer” is the fact that the first edition has ...
Lire la suiteThyroid Cytopathology uses a simple algorithmic approach to the diagnosis of thyroid fine needle aspirations (FNA). This ...
Lire la suiteThis book consists of contributions given in honor of Wolfgang J.R. Hoefer. The contributions represent the state of the ...
Lire la suiteNetwork flow optimization analyzes optimization problems on networks; hence, network optimization is reflected in many application ...
Lire la suiteThe book covers the different fields of learning technologies: education, psychology, computer science. The book address ...
Lire la suiteGovernments have known since the 1960s that smoking results in irreversible health damage. This open access book examines ...
Lire la suiteThis book will awaken the interest of breeders, phytopathologists, environmentalists, extension services, plant virologists, ...
Lire la suiteThis two-volume set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
Lire la suiteThis two-books set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
Lire la suiteThe LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...
Lire la suiteThis is Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; ...
Lire la suiteThe book is organized in topical sections on parameterized systems, model checking, applications, static analysis, concurrent/distributed ...
Lire la suiteThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
Lire la suiteThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
Lire la suiteThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Lire la suiteThis set of lectures collects surveys of open problems in celestial dynamics and dynamical astronomy applied to solar, extra-solar ...
Lire la suiteThis book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together ...
Lire la suite