This book describes the state of the art and future prospects of the most important bio-medicolegal subdisciplines in the post-genomic framework of personalized medicine.
This book of 'directions' focuses on cyber security research, education and training in India, and work in this domain within the Indian Institute of Technology Kanpur.
This book introduces readers to the topical area of CSI: critical space infrastructure, which is defined as an emerging domain of systems-of-systems encompassing hardware, workforce, environment, facilities, business and organizational entities.
This book offers a broad survey of all information made public - from 1993 until today - on keystream sequence generators based on irregular decimation, which are referred to as shrinking generators.
This book covers the methodological, epistemological and practical issues of integrating qualitative and socio-anthropological factors into archaeological modeling.
The book includes the best extended papers which were selected from the 3rd International Conference of Electrical and Information Technologies (ICEIT 2017, Morocco).
This book contains original research chapters related to the interdisciplinary field of complex networks spanning biological and environmental networks, social, technological, and economic networks.
This book addresses a key technology for digital information processing: Kalman filtering, which is generally considered to be one of the greatest discoveries of the 20th century.
The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019.
This book constitutes the refereed post-conference proceedings of the Second International Conference on Cyber Security and Computer Science, ICONCS 2020, held in Dhaka, Bangladesh, in February 2020.
This book gathers the proceedings of the 12th International Conference on Measurement and Quality Control - Cyber Physical Issues (IMEKO TC 14 2019), held in Belgrade, Serbia, on 4-7 June 2019.
This book, now in its third edition, offers a practical guide to the use of probability and statistics in experimental physics that is of value for both advanced undergraduates and graduate students.
This monograph is the first of its kind to present innovative research results on truncated predictor feedback (TPF) designs for general linear systems with input delay.
This book contains contributions from the participants of the research group hosted by the ZiF - Center for Interdisciplinary Research at the University of Bielefeld during the period 2013-2017 as well as from the conclusive conference organized at Bielefeld in December 2017.
This book offers a systematic and rigorous treatment of continuous-time Markov decision processes, covering both theory and possible applications to queueing systems, epidemiology, finance, and other fields.
This book constitutes the proceedings of the 17th International Workshop on Algorithms and Models for the Web Graph, WAW 2020, held in Warsaw, Poland, in September 2020.
This book constitutes the proceedings of the 23rd Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2018, held in Lisbon, Portugal, in June 2018.
This book constitutes the refereed post-conference proceedings of the 29th International Workshop on Combinatorial Algorithms, IWOCA 2018, held in Singapore, Singapore, in July 2018.
This book constitutes the refereed proceedings of the 14th International Conference on Economics of Grids, Clouds, Systems, and Services, GECON 2017, held in Biarritz, France, in September 2017.
This book constitutes the proceedings of the 7th International Conference on Algorithms and Discrete Applied Mathematics, CALDAM 2021, which was held in Rupnagar, India, during February 11-13, 2021.
This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017.
This two-volume set LNICST 357-358 constitutes the post-conference proceedings of the 11th EAI International Conference on Wireless and Satellite Services, WiSATS 2020, held in Nanjing, China, in September 2020.
The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.
This book is a course-tested primer on the thermodynamics of strongly interacting matter - a profound and challenging area of both theoretical and experimental modern physics.
This book constitutes the refereed proceedings of the First International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020, which was organized in conjunction with the European Symposium on Research in Computer Security, ESORICS 2020, and held online on September 2020.
This book constitutes the refereed proceedings of the 14th International Conference on Virtual Reality and Augmented Reality, EuroVR 2017, held in Laval, France, in December 2017.
This volume presents the proceedings of the meeting New Trends in One-Dimensional Dynamics, which celebrated the 70th birthday of Welington de Melo and was held at the IMPA, Rio de Janeiro, in November 2016.
Modern developments of Random Matrix Theory as well as pedagogical approaches to the standard core of the discipline are surprisingly hard to find in a well-organized, readable and user-friendly fashion.
This book presents solutions to control problems in a number of robotic systems and provides a wealth of worked-out examples with full analytical and numerical details, graphically illustrated to aid in reader comprehension.
This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in Dakar, Senegal, in May 2017.
Crime Scene Investigation Laboratory Manual, Second Edition, is written by a former crime scene investigator and forensic scientist who provides practical, straightforward, and immediately applicable best practices.
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems.
Forensic Examination of Signatures explains the neuroscience and kinematics of signature production, giving specific details of research carried out on the topic.
In our attempts to understand crime, researchers typically focus on proximate factors such as the psychology of offenders, their developmental history, and the social structure in which they are embedded.