Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)

 “Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in...

Energy Justice Across Borders
Energy Justice Across Borders

This book is open access under a CC BY 4.0 license.

We must find new and innovative ways of conceptualizing transboundary energy issues, of embedding concerns of ethics or justice into energy policy, and of operationalizing response to them. This book stems from the emergent gap;...

New Approaches to CSR, Sustainability and Accountability, Volume I (Accounting, Finance, Sustainability, Governance & Fraud: Theory and Application)
New Approaches to CSR, Sustainability and Accountability, Volume I (Accounting, Finance, Sustainability, Governance & Fraud: Theory and Application)
This book provides a platform for discussing the challenges that organizations face in order to implement sustainability, ethics, and effective corporate governance, all of which are important elements of “standing out” from other companies. Examining the background of the New European Consensus on development with the new...
Advanced Topics in Fuzzy Graph Theory (Studies in Fuzziness and Soft Computing (375))
Advanced Topics in Fuzzy Graph Theory (Studies in Fuzziness and Soft Computing (375))

This book builds on two recently published books by the same authors on fuzzy graph theory. Continuing in their tradition, it provides readers with an extensive set of tools for applying fuzzy mathematics and graph theory to social problems such as human trafficking and illegal immigration. Further, it especially focuses on advanced...

Queueing Theory with Applications to Packet Telecommunication
Queueing Theory with Applications to Packet Telecommunication
Soon after Samuel Morse’s telegraphing device led to a deployed electrical
telecommunications system in 1843, waiting lines began to form by those
wanting to use the system. At this writing queueing is still a significant factor in
designing and operating communications services, whether they are provided
over the Internet
...
Concurrency Theory: Calculi an Automata for Modelling Untimed and Timed Concurrent Systems
Concurrency Theory: Calculi an Automata for Modelling Untimed and Timed Concurrent Systems
In the world we live in concurrency is the norm. For example, the human body
is a massively concurrent system, comprising a huge number of cells, all simultaneously
evolving and independently engaging in their individual biological
processing. In addition, in the biological world, truly sequential systems rarely
arise. However,
...
Python Scripting for Computational Science (Texts in Computational Science and Engineering)
Python Scripting for Computational Science (Texts in Computational Science and Engineering)
The goal of this book is to teach computational scientists and engineers how to develop tailored, flexible, and efficient working environments built from small programs (scripts) written in the easy-to-learn, very high-level language Python. The focus is on examples and applications of relevance to computational science: gluing existing...
Multimedia Data Mining and Knowledge Discovery
Multimedia Data Mining and Knowledge Discovery
Multimedia information is ubiquitous and essential in many applications, and repositories of multimedia are numerous and extremely large. Consequently, researchers and professionals need new techniques and tools for extracting the hidden, useful knowledge embedded within multimedia collections, thereby helping them discover relationships between...
Supervised and Unsupervised Ensemble Methods and their Applications (Studies in Computational Intelligence)
Supervised and Unsupervised Ensemble Methods and their Applications (Studies in Computational Intelligence)
The rapidly growing amount of data, available from different technologies in the field of bio-sciences, high-energy physics, economy, climate analysis, and in several other scientific disciplines, requires a new generation of machine learning and statistical methods to deal with their complexity and heterogeneity. As data collections becomes...
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems
Foundations of Dependable Computing: Models and Frameworks for Dependable Systems presents two comprehensive frameworks for reasoning about system dependability, thereby establishing a context for understanding the roles played by specific approaches presented in this book's two companion volumes. It then explores the range of models and...
Flexible Shift Planning in the Service Industry: The Case of Physicians in Hospitals
Flexible Shift Planning in the Service Industry: The Case of Physicians in Hospitals

The book presents new ideas to model and solve the flexible shift planning problem of personnel workers in the service industry. First, a new modeling approach is proposed that requires shifts to be generated implicitly rather than employing a predefined set of shift types like three 8-hour or two 12-hour shifts to cover varying forecast demand....

Business Process Management Workshops: BPM 2009 International Workshops
Business Process Management Workshops: BPM 2009 International Workshops

This book constitutes the thoroughly refereed post-workshop proceedings of eight international workshops held in Ulm, Germany, in conjunction with the 7th International Conference on Business Process Management, BPM 2009, in September 2009. The eight workshops were on Empirical Research in Business Process Management (ER-BPM 2009), Reference...

unlimited object storage image
Result Page: 480 479 478 477 476 475 474 473 472 471 470 469 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy