This book explains in detail, with supporting examples, one of the most common statistical methods: regression. The first ...
Lire la suiteThe increasing accumulation of people in historyless living machines, the challenges posed by migration and a lack of space ...
Lire la suiteFor operators of nuclear research facilities, it is of particular importance to investigate minor incidents. The nuclear ...
Lire la suiteIn vivo magnetic resonance imaging (MRI) has evolved into a versatile and critical, if not ‘gold standard’, imaging tool ...
Lire la suiteIn this book, the three two major defect assessment tools for pipes are presented : i) the failure assessment diagram and ...
Lire la suiteThis volume is the Italian version of the original Principles of Food Sanitation, now in its fifth edition, whose validity ...
Lire la suiteThis book constitutes the thoroughly refereed post-proceedings of 10 internationl workshops held as satellite events of the ...
Lire la suiteAs the characteristic dimensions of electronic devices continue to shrink, the ability to characterize their electronic properties ...
Lire la suiteCompiled with the selection tests in mind as a tool for rapid revision and analytical learning. It is useful for doctors, ...
Lire la suiteVisual notations and languages continue to play a pivotal role ˆ in the design of complex software systems. In many cases ...
Lire la suiteScenographic design drawings visualize the images in the designer’s ‘mind’s eye’ early in the design process. They ...
Lire la suiteA Goal of this volume is to initiate conversations among those working across the research-to-control spectrum on schistosomiasis ...
Lire la suiteNew forms of imaging in science have nearly always led to major advances, especially at the nanoscale, and the pace of these ...
Lire la suiteThe scope of the workshop included the following topics: – design of distributed applications – development methodologies ...
Lire la suiteThe present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
Lire la suiteExamines various topics and approaches related to the security and privacy in big data and cloud computing, where authors ...
Lire la suiteThis volume contains the papers presented at the Third International Conference on Security in Pervasive Computing (SPC 2006), ...
Lire la suiteT this book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent ...
Lire la suiteNoisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...
Lire la suiteA major challenge in the modeling and simulation of tumor growth is the mathematical description of living matter, which ...
Lire la suite