Based on a case study the author unveils a gap in the governance of development projects, a gap between implementation and ...
Lire la suiteA prosthetic arm equipped with internet of behavior technology has the potential to greatly improve the lives of those who ...
Lire la suite
This book constitutes the thoroughly referred post-proceedings of the International Provenance and Annotation Workshops, ...
Lire la suite
This book is organized in topical sections on provenance: models and querying; provenance: visualization, failures, identity; ...
Lire la suite
To discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives ...
Lire la suite
Venture capital is widely regarded as an important driver of economic growth. While the USA has the largest and most sophisticated ...
Lire la suite
Natural medicines are derived from natural sources such as plants, animals and/or mineral origins. The use of traditional ...
Lire la suite
Quality of Service in Optical Burst Switched Networks is a broad review and reference for researchers and professionals of ...
Lire la suite
While addressing the security challenges and threats in blockchain, this book is also an introduction to quantum cryptography ...
Lire la suite
This volume contains the main results of the three years study (2003 - 2007) of the Virtual Institute RESPACE (Key Technologies ...
Lire la suite
In the post-Civil Rights era, there is a temptation to assume that racism is no longer the pressing social concern in the ...
Lire la suite
This volume is devoted to the Persistent Scatterer Technique, the latest development in radar interferometric data processing. ...
Lire la suite
Rare Earth Elements in Groundwater Flow Systems is the first volume of its kind entirely focused on the geochemistry of the ...
Lire la suite
Constitutes the extended post-proceedings of the ERCIM/CoLogNet International Workshop on Constraint Satisfaction and Constraint ...
Lire la suite
This book presents the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took ...
Lire la suite
This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Lire la suite
This book expands the lectures given at IWOTA’05 (International Workshop on Operator Theory and Applications) which was ...
Lire la suite
Reusability of information models has been discussed in science and practice for many years. Reference models are information ...
Lire la suite
The book addressed span a wide range of problems and solutions associated with the teaching of programming such as introductory ...
Lire la suite
Starting from the now classical book by Ladislav Cerych and Paul Sabatier (1986), the editors present a critical appreciation ...
Lire la suite