This book constitutes the refereed post-conference proceedings of the 5th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2017, held in Havana, Cuba, in September 2017.
Approaching the topic from a law enforcement perspective, this volume provides an unprecedented look at the investigation of human trafficking in America.
Fundamentals of Information Systems contains articles from the 7th International Workshop on Foundations of Models and Languages for Data and Objects (FoMLaDO '98), which was held in Timmel, Germany.
3D bioprinting is an emerging innovative technology that involves the fabrication of essential 3D functional biomedical constructs by combining cells and biomaterials with vital growth and differentiation factors.
Veterinary Forensics: Investigation, Evidence Collection, and Expert Testimony will provide anyone involved in an investigation of an animal involved crime or civil action with the knowledge and tools that can give guidance for their actions in completing a forensic investigation.
This third volume of the Wireless Public Safety Networks series explores new tendencies in the Public Safety Networks (PSNs) field, highlighting real-use cases and applications that can be used by practitioners to help victims in the case of danger.
This book constitutes the refereed conference proceedings of the 13th International Conference on Computational Data and Social Networks, CSoNet 2024, held in Bangkok, Thailand, during December 16–18, 2024.
This book reports on cutting-edge research and developments focusing on integrating intelligent functionalities into materials, components, systems and products.
This book constitutes the proceedings of the 18th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2020, held in L'Aquila, Italy, in October 2020.
This unique, first of its kind, book offers an integrated treatment of the atomistic-continuum behaviours of single and interacting microdefects under elasto-static loading.
This book reports on cutting-edge theories and methods for analyzing complex systems, such as transportation and communication networks and discusses multi-disciplinary approaches to dependability problems encountered when dealing with complex systems in practice.
In this book the applicability and the utility of two statistical approaches for understanding dark energy and dark matter with gravitational lensing measurement are introduced.
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018.
With over 50,000 iPhone apps to choose from, there's a mind-boggling number of ways to make your favorite device do just about anything you can imagine -- and almost certainly a few things you would never think of.
Information Organization and Databases: Foundations of Data Organization provides recent developments of information organization technologies that have become crucial not only for data mining applications and information visualization, but also for treatment of semistructured data, spatio-temporal data and multimedia data that are not necessarily stored in conventional DBMSs.
With respect to the first edition as Volume 218 in the Lecture Notes in Con- trol and Information Sciences series the basic idea of the second edition has remained the same: to provide a compact presentation of some basic ideas in the classical theory of input-output and closed-loop stability, together with a choice of contributions to the recent theory of nonlinear robust and 1foo control and passivity-based control.
This book integrates research on the causes, responses and protective strategies for vicarious trauma that are recognised in a range of human services and argues their relevance to the legal profession.
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021.
Let us begin by quoting from the Preface to the author's Statistical Physics (Moscow, Nauka 1982; also published in English by Harwood in 1986): ''My God!
This work is aimed at mathematics and engineering graduate students and researchers in the areas of optimization, dynamical systems, control sys- tems, signal processing, and linear algebra.
This monograph is intended to present the fundamentals of the theory of abstract parabolic evolution equations and to show how to apply to various nonlinear dif- sion equations and systems arising in science.
Your software needs to leverage multiple cores, handle thousands of users and terabytes of data, and continue working in the face of both hardware and software failure.
Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively.
Building on Wilson's renormalization group, the authors have developed a unified approach that not only reproduces known results but also yields new results.
Though there have been significant advances in the theory and applications of linear time-invariant systems, developments regarding repetitive control have been sporadic.
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018.