Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems
Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems

As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the mid-1990s, when Internet became widespread and the information...

Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011
Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011

FASE (Fundamental Approaches to Software Engineering) is concerned with the foundations on which software engineering is built. Its focus is on novel techniques and the way in which they contribute to making software engineering a more mature and soundly based discipline. This year, we particularly encouraged contributions that combine the...

A Practical Guide to the Eustachian Tube
A Practical Guide to the Eustachian Tube

This book, written by international experts, is a detailed guide to the Eustachian tube, with emphasis on those aspects of most relevance to the practitioner. The opening chapters document the clinical anatomy and provide essential information on physiology, with explanation of the new model of tubal mechanics. Diagnosis and therapy for the...

Pancreatitis and Its Complications (Clinical Gastroenterology)
Pancreatitis and Its Complications (Clinical Gastroenterology)

Diseases of the pancreas have been extremely difficult to study. Until relatively recently, the pancreas was viewed by surgeons as an organ to be avoided, given its deep retroperitoneal location and the sometimes severe consequences of manipulation. Similar difficulties have plagued careful study of the pancreas. In humans, only inf- quently...

Cryptographic Security Architecture: Design and Verification
Cryptographic Security Architecture: Design and Verification
This book describes various aspects of cryptographic security architecture design, with a
particular emphasis on the use of rigorous security models and practices in the design. The
first portion of the book presents the overall architectural basis for the design, providing a
general overview of features such as the object model and
...
MPEG-4 Beyond Conventional Video Coding: Object Coding, Resilience and Scalability
MPEG-4 Beyond Conventional Video Coding: Object Coding, Resilience and Scalability
MPEG-4 (with a formal ISO/IEC designation ISO/IEC 14496) standardization was initiated in 1994 to address the requirements of the rapidly converging telecommunication, computer, and TV/film industries. MPEG-4 had a mandate to standardize algorithms for audiovisual coding in multimedia applications, digital television, interactive graphics, and...
Topology-based Methods in Visualization (Mathematics and Visualization)
Topology-based Methods in Visualization (Mathematics and Visualization)
Enabling insight into large and complex datasets is a prevalent theme in visualization research for which different approaches are pursued.

Topology-based methods are built on the idea of abstracting characteristic structures such as the topological skeleton from the data and to construct the visualizations accordingly. There are currently new...

Nanobioelectrochemistry: From Implantable Biosensors to Green Power Generation (Nanobioengineering)
Nanobioelectrochemistry: From Implantable Biosensors to Green Power Generation (Nanobioengineering)

Nanobioelectrochemistry covers the modern aspects of bioelectrochemistry, nanoscience and materials science. The combination of nanostructured materials and biological molecules enables the development of biodevices capable to detect specific substances. Furthermore, by using the bioelectrochemistry approach, the interaction between...

Phenomenology of Space and Time: The Forces of the Cosmos and the Ontopoietic Genesis of Life: Book Two (Analecta Husserliana)
Phenomenology of Space and Time: The Forces of the Cosmos and the Ontopoietic Genesis of Life: Book Two (Analecta Husserliana)

This work celebrates the investigative power of phenomenology to explore the phenomenological sense of space and time in conjunction with the phenomenology of intentionality, the invisible, the sacred, and the mystical. It examines the course of life through its ontopoietic genesis, opening the cosmic sphere to logos. The work also explores,...

Herding Chickens: Innovative Techniques for Project Management
Herding Chickens: Innovative Techniques for Project Management
Get The Straight Scoop On Project Management—Ingenious Strategies That Work!

Have you studied the traditional processes of project management, only to discover that in reality they fall short? Are you done with the idealistic theories of how things should function and eager to apply
...
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Machine Learning for Adaptive Many-Core Machines - A Practical Approach (Studies in Big Data)
Machine Learning for Adaptive Many-Core Machines - A Practical Approach (Studies in Big Data)

The overwhelming data produced everyday and the increasing performance and cost requirements of applications are transversal to a wide range of activities in society, from science to industry. In particular, the magnitude and complexity of the tasks that Machine Learning (ML) algorithms have to solve are driving the need to devise...

unlimited object storage image
Result Page: 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy