This book summarizes presentations and discussions from the two-day international workshop held at UC Berkeley in March 2015, ...
Lire la suite
The book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
Lire la suite
This book addresses the way in which urban and urbanizing regions profoundly impact and are impacted by climate change. ...
Lire la suite
The goal of this open access book is to develop an approach to clinical health care ethics that is more accessible to, and ...
Lire la suite
This book is based on work from the COST Action “RESTORE - REthinking Sustainability TOwards a Regenerative Economy'', ...
Lire la suite
This open access book offers new insights into the ageing-migration nexus and the nature of home. Documenting the hidden ...
Lire la suiteThis book provides new conceptualisations on the networks of migrants and their descendants in accessing the labour market. ...
Lire la suite
The conventional approach to risk communication, based on a centralized and controlled model, has led to blatant failures ...
Lire la suiteRisk management is a process to assist in the decision-making. The risk management process takes the potential hazards as ...
Lire la suite
This open access book surveys the frontier of scientific river research and provides examples to guide management towards ...
Lire la suite
This book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly ...
Lire la suite
The objective of this book is to help at-risk organizations to decipher the “safety cloud”, and to position themselves ...
Lire la suite
The use of non-standard technologies such as superconductivity, cryogenics and radiofrequency pose challenges for the safe ...
Lire la suite
This book addresses a wide variety of events and technologies concerning the sago palm, ranging from its botanical characteristics, ...
Lire la suite
A Goal of this volume is to initiate conversations among those working across the research-to-control spectrum on schistosomiasis ...
Lire la suiteThis book is an update of the first BACC assessment, published in 2008. It offers new and updated scientific findings in ...
Lire la suite
Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
Lire la suite
the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
Lire la suite
This book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
Lire la suite
New data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...
Lire la suite