The conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability ...
Lire la suite
                This book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...
Lire la suite
                This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...
Lire la suite
                Manufacturing systems and processes are becoming increasingly complex, making more rational decision-making in process control ...
Lire la suite
                This practical and greatly expanded edition by media and public relations veteran Colin Doeg focuses on the communications ...
Lire la suite
                This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
Lire la suite
                This book contains variety of subjects in modern high performance computing and its applications, such as numerical and ...
Lire la suite
                This volume is one of the very few publications dedicated to the challenges that Continental philosophy poses to the field ...
Lire la suiteTechnical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating ...
Lire la suite
                This book constitutes the refereed proceedings of the First International Conference on Data Management in Grid and Peer-to-Peer ...
Lire la suite
                This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Data Management in ...
Lire la suite
                For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting ...
Lire la suite
                This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
Lire la suite
                This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
Lire la suite
                This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...
Lire la suite
                Contains the proceedings of the 'Second Latin-American Symposium' on Dependable Computing, LADC 2005. This book comprises ...
Lire la suite
                This book is for scientists and experts who work on urban food policies. It provides a conceptual framework for understanding ...
Lire la suite
                The book examines the methodological challenges in analyzing the effectiveness of development policies. It presents a selection ...
Lire la suite
                This book presented similarity search, architectures, personalization, interoperability, evaluation, miscellaneous, preservation, ...
Lire la suite
                This book presented similarity search, architectures, personalization, interoperability, evaluation, miscellaneous, preservation, ...
Lire la suite