The book explains the security architecture model and the practice of building data sharing from the blockchain infrastructure, ...
Lire la suiteBlockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger ...
Lire la suiteWhile the problems of long-term stability and biocompatibility are being addressed, several promising prototypes are starting ...
Lire la suiteThis book argues that this standard image of the great German philosopher is radically wrong. Not only does Kant reflect ...
Lire la suiteThe ability of stem cells to acquire different desired phenotypes has opened the door for a new discipline: regenerative ...
Lire la suiteTissue engineering is gaining interest as it is applied for regeneration of organs to attain their lost function. Although ...
Lire la suiteThis book constitutes the refereed proceedings of the 21st IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE ...
Lire la suitethis book analyses patterns of internationalisation comprising the national and supranational level, the level of higher ...
Lire la suiteBorders, Mobility and Technologies of Control provides a model of criminological inquiry that is global in scope, constructionist ...
Lire la suiteThis book uses Pierre Bourdieu’s field theory as a lens through which to examine military operations. Novel in its approach, ...
Lire la suiteThere are several crucial feedbacks from forests to the climate system. The mechanisms for those feedbacks are elaborated ...
Lire la suiteThis volume adopts an ecosystems approach to understanding the world's boreal peatlands. It focuses on biogeochemical patterns ...
Lire la suiteThe book considers the diverse experiences of urban and rural families before the war and the effects of the timing of their ...
Lire la suiteBotanicals, which have been part of human food and medicine for thousands of years, are perceived as being safer than synthetic ...
Lire la suiteThis easy-to-use book helps you acquire a wealth of fascinating information about plants. There are 130 pages with text, ...
Lire la suiteBotnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based ...
Lire la suiteThe book is the result of intensive work of 43 authors, all of them leading scientists in the Botrytis sciences. New technologies ...
Lire la suiteBoundary representation is the principle solid modelling method used in modern CAD/CAM systems. There have been a long series ...
Lire la suiteThe book is rich in references and leaves no aspect of the problem untouched. The morphological, pharmacological, physiological ...
Lire la suiteThis text is intended to provide an overview of brain death. The topics explored in this book are the concept and historical ...
Lire la suite