The relatively recent increase in computational power available for mathematical modeling and simulation raises the possibility that modern numerical methods can play a significant role in the analysis of complex particulate flows. This introductory monograph focuses on basic models and physically based computational solution strategies for the...
This Festschrift volume, dedicated to He Jifeng on the occasion of his 70th birthday in September 2013, includes 24 refereed papers by leading researchers, current and former colleagues, who congratulated at a celebratory symposium held in Shanghai, China, in the course of the 10th International Colloquium on Theoretical Aspects of Computing,...
This book represents the most up-to-date description of the state of the art in laser and light source technology. After an initial chapter describing the latest understanding of laser physics and safety, subsequent chapters take up the laser treatment, respectively, of vascular lesions, pigmented lesions and tattoos, unwanted hair, ablative...
Important new insights into how various components and systems evolved
Premised on the idea that one cannot know a science without knowing its history, History of Wireless offers a lively new treatment that introduces previously unacknowledged pioneers and developments, setting a new standard for understanding the evolution of this important...
To all appearances, the business of cinema goes on as usual. Yes, movies are being made. The production lines in the studios keep churning out their images. The digital effects specialists stay up late at night to meet endless deadlines. Films open in Berlin or Cannes. Critics write their reviews. People talk about the latest releases at work or...
eTransformation in Governance: New Directions in Government and Politics is about transformation in government and governance due to the information society development. The book provides conceptual clarification of the e-transformation in governance, and presents empirical findings on the recent developments in Western countries. The...
Historically, computer security is related to both cryptography and access
control in operating systems. Cryptography, although mostly applied in
the military and diplomacy, was used to protect communication channels
and storage facilities (especially the backups). In the seventies there was a
breakthrough in cryptography - the...
Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...
Immediately following the events of September 11, 2001, the National Academies (including the National Academy of Sciences, the National Academy of Engineering, the Institute of Medicine, and the National Research Council) offered its services to the nation to formulate a scientific and technological response to the challenges posed by emerging...
When I moved to Los Angeles from the East Coast, I was thrilled to have the opportunity to work in the entertainment industry. As I was studying and building my fitness business, my day job was as an assistant account executive at a Beverly Hills public relations firm. I spent lots of time with up-and-comers as well as with the most...
This volume continues the series of proceedings of the annual ADBIS conferences
in the field of advances in databases and information systems.
ADBIS, founded by the Moscow ACM SIGMOD Chapter, was extended into
a regular East-European conference in 1996 to establish a forum for promoting
interaction and...
A range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense provides an overview of complex systems’...