Based primarily on Eurocode 2, this book offers a comprehensive exploration of theory alongside a substantial collection ...
Lire la suiteConcrete-Filled Double-Skin Steel Tubular Columns: Behavior and Design provides a thorough review of the recent advances ...
Lire la suiteConcurrency Theory is a synthesis of one of the major threads of theoretical computer science research focusing on languages ...
Lire la suiteThe volume consists of seven sections, six of which are dedicated to the main research areas to which Ugo Montanari has contributed: ...
Lire la suiteManufacturing systems and processes are becoming increasingly complex, making more rational decision-making in process control ...
Lire la suiteLeading experts provide timely and comprehensive information on methods for conditional mutagenesis in the mouse (part 1) ...
Lire la suiteConducting Polymers with Micro or Nanometer Structure describes a topic discovered by three winners of the Nobel Prize in ...
Lire la suiteTORCH is a group of infections that can be passed from the pregnant mother to her fetus through the placenta. TORCH, includes ...
Lire la suiteCovering developments in Conjoint Analysis, this book presents the theory and applications of this technique. It discusses: ...
Lire la suiteThis book brings together the fundamental ideas of information theory and the statistical mechanics of phase transitions ...
Lire la suiteConstituents of Modern System-safety Thinking contains the invited papers presented at the Thirteenth annual Safety-critical ...
Lire la suiteUsing the principal tools of prediction and optimisation, this work gives the examples of how to deal with constraints, placing ...
Lire la suiteConstraint satisfaction problems are significant in the domain of automated reasoning for artificial intelligence. They can ...
Lire la suiteThe enormous potential of digital computation to manage new complex systems is impeded by exponential increases in complexity. ...
Lire la suiteCovers both traditional and contemporary materials, current industry standards and new and emerging technologies. The only ...
Lire la suiteIntroduces students to entirely new definitions and theories of the Critical Path Method (CPM), the leading scheduling method, ...
Lire la suiteHistory based access control and secure information flow The spec# programming system Mastering test generation from smart ...
Lire la suiteThis book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of ...
Lire la suiteStructured to encourage a diversity of techniques, allowing each student the means to find and put into practice the appropriate ...
Lire la suiteCancer is perhaps the modern world's most feared disease. Yet, we know relatively little about this malady's history before ...
Lire la suite