Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...
Lire la suiteThe management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...
Lire la suiteThe chapters within this volume examine those complexities using a range of traditional and nontraditional measures—such ...
Lire la suiteProvides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, ...
Lire la suiteProvides both an up-to-date overview of the field of bridge engineering and significant contributions to the process of more ...
Lire la suiteThis book gives a systematic presentation of modern measure theory as it has developed over the past century and offers ...
Lire la suiteThis book welcomes students into the fundamental theory of measure, integration, and real analysis. Focusing on an accessible ...
Lire la suiteThis book covers the underlying science and application issues related to aggregation operators, focusing on tools used in ...
Lire la suiteThis book presents a discussion on human rights-based attributes for each article pertinent to the substantive rights of ...
Lire la suiteThis updated and expanded second edition has been informed by a major R&D programme on offshore risk assessment in Norway ...
Lire la suiteThis two-volume set LNCS 12269 and LNCS 12270 constitutes the refereed proceedings of the 16th International Conference on ...
Lire la suiteThis two-volume set LNCS 12269 and LNCS 12270 constitutes the refereed proceedings of the 16th International Conference on ...
Lire la suiteThis book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...
Lire la suiteEmphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview ...
Lire la suiteThis volume presents the state of the art concerning quality and interestingness measures for data mining. The book summarizes ...
Lire la suiteThis book investigates the effects of changes in leadership and managerial structures of Nordic universities resulting from ...
Lire la suiteThis textbook offers a practical guide into research ethics for undergraduate students in the social sciences. A step-by-step ...
Lire la suiteThe use of non-standard technologies such as superconductivity, cryogenics and radiofrequency pose challenges for the safe ...
Lire la suite"Sinkholes and Subsidence" provides a twenty-first century account of how the various subsidence features in carbonate ...
Lire la suiteFrom the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception ...
Lire la suite