The book – the first of its kind – establishes new theory and knowledge in the area of third sector organizations (TSOs) ...
Lire la suiteDo small developing economies, or SDEs, need a specific competition policy to create competitive markets? Against the backdrop ...
Lire la suiteThis book explores the possibilities of applying the theories of complexity and self-organization developed to account for ...
Lire la suiteThis book, written by an international team of experts, introduces the reader to various aspects of complexity theory and ...
Lire la suiteThis book talks about how the regulatory agencies and courts in the United States, European Union and India are dealing with ...
Lire la suiteComponent-based software development regards software construction in terms of conventional engineering disciplines where ...
Lire la suiteOil tankers are not the only vessels that have caused oil pollution at sea. Numerous spills in the past have been of heavy ...
Lire la suiteComputational intelligence (CI), as an alternative to statistical and econometric approaches, has been applied to a wide ...
Lire la suiteComputational intelligence (CI), as an alternative to statistical and econometric approaches, has been applied to a wide ...
Lire la suiteComputational and Statistical Approaches to Genomics, 2nd Edition, aims to help researchers deal with current genomic challenges. ...
Lire la suiteThe two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer ...
Lire la suiteThe two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer ...
Lire la suiteThis volume presented automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical ...
Lire la suiteThis volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
Lire la suiteThis volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
Lire la suiteFor graduate and undergraduate courses in computer science, computer engineering, and electrical engineering. Comprehensively ...
Lire la suiteContains new examples and material highlighting the emergence of mobile computing and the cloud. It explores this generational ...
Lire la suiteDesigned to be used in modern computing environments such as cloud computing, mobile devices, and other embedded systems. ...
Lire la suiteThe conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability ...
Lire la suiteFor graduate and undergraduate courses in computer science, computer engineering, and electrical engineering. Comprehensively ...
Lire la suite