This book explains in detail, with supporting examples, one of the most common statistical methods: regression. The first ...
Lire la suite
The increasing accumulation of people in historyless living machines, the challenges posed by migration and a lack of space ...
Lire la suite
For operators of nuclear research facilities, it is of particular importance to investigate minor incidents. The nuclear ...
Lire la suite
In vivo magnetic resonance imaging (MRI) has evolved into a versatile and critical, if not ‘gold standard’, imaging tool ...
Lire la suite
In this book, the three two major defect assessment tools for pipes are presented : i) the failure assessment diagram and ...
Lire la suite
This volume is the Italian version of the original Principles of Food Sanitation, now in its fifth edition, whose validity ...
Lire la suite
This book constitutes the thoroughly refereed post-proceedings of 10 internationl workshops held as satellite events of the ...
Lire la suite
As the characteristic dimensions of electronic devices continue to shrink, the ability to characterize their electronic properties ...
Lire la suite
Compiled with the selection tests in mind as a tool for rapid revision and analytical learning. It is useful for doctors, ...
Lire la suite
Visual notations and languages continue to play a pivotal role ˆ in the design of complex software systems. In many cases ...
Lire la suite
Scenographic design drawings visualize the images in the designer’s ‘mind’s eye’ early in the design process. They ...
Lire la suite
A Goal of this volume is to initiate conversations among those working across the research-to-control spectrum on schistosomiasis ...
Lire la suite
New forms of imaging in science have nearly always led to major advances, especially at the nanoscale, and the pace of these ...
Lire la suite
The scope of the workshop included the following topics: – design of distributed applications – development methodologies ...
Lire la suite
The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
Lire la suite
Examines various topics and approaches related to the security and privacy in big data and cloud computing, where authors ...
Lire la suite
This volume contains the papers presented at the Third International Conference on Security in Pervasive Computing (SPC 2006), ...
Lire la suite
T this book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent ...
Lire la suite
Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...
Lire la suite
A major challenge in the modeling and simulation of tumor growth is the mathematical description of living matter, which ...
Lire la suite