You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
Lire la suite
3DTV require the integration of a diversity of key technologies from computing to graphics, imaging to display, and signal ...
Lire la suite
The thymic pathology is related to several complex congenital, non-oncological, and oncological diseases. Many of these illnesses ...
Lire la suite
One of the main reasons for publishing this second edition of “T- roid Cancer” is the fact that the first edition has ...
Lire la suite
Thyroid Cytopathology uses a simple algorithmic approach to the diagnosis of thyroid fine needle aspirations (FNA). This ...
Lire la suite
This book consists of contributions given in honor of Wolfgang J.R. Hoefer. The contributions represent the state of the ...
Lire la suite
Network flow optimization analyzes optimization problems on networks; hence, network optimization is reflected in many application ...
Lire la suite
The book covers the different fields of learning technologies: education, psychology, computer science. The book address ...
Lire la suite
Governments have known since the 1960s that smoking results in irreversible health damage. This open access book examines ...
Lire la suite
This book will awaken the interest of breeders, phytopathologists, environmentalists, extension services, plant virologists, ...
Lire la suite
This two-volume set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
Lire la suite
This two-books set constitutes the proceedings of the 27th International Conference on Tools and Algorithms for the Construction ...
Lire la suite
The LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...
Lire la suite
This is Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; ...
Lire la suite
The book is organized in topical sections on parameterized systems, model checking, applications, static analysis, concurrent/distributed ...
Lire la suiteThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
Lire la suiteThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
Lire la suite
This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Lire la suite
This set of lectures collects surveys of open problems in celestial dynamics and dynamical astronomy applied to solar, extra-solar ...
Lire la suite
This book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together ...
Lire la suite