This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conference on Cryptology and Network Security, CANS 2024, held in Cambridge, United Kingdom during September 24-27, 2024.
This book presents high-quality research papers presented at Congress on Smart Computing Technologies (CSCT 2023) organized by SAU Center for Research and Innovative Learning (SCRIL), South Asian University, India, from 2-3 December 2023.
This book explores the impact of micro-influencers in the digital age, focusing specifically on creative professionals in the Australian communications industry.
This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conference on Cryptology and Network Security, CANS 2024, held in Cambridge, United Kingdom during September 24-27, 2024.
Looking at both Lusophone literature and literatures from around the globe from the perspective of intercultural communication, this book addresses post-colonial literature, intercultural negotiations, and how multicultural debates are reflected in literary production.
This book constitutes the proceedings of the 26th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2024, held in Nagoya, Japan, during October 20-22, 2024.
Looking at both Lusophone literature and literatures from around the globe from the perspective of intercultural communication, this book addresses post-colonial literature, intercultural negotiations, and how multicultural debates are reflected in literary production.
This book serves as a comprehensive guide for legal practitioners, providing a primer on digital forensic evidence and essential technological concepts.
This book serves as a comprehensive guide for legal practitioners, providing a primer on digital forensic evidence and essential technological concepts.
This three-volume set CCIS 2366-2368 constitutes the refereed proceedings of the 6th International Conference on Computational Intelligence in Communications and Business Analytics, CICBA 2024, held in Patna, India, during January 23-25, 2024.
This book draws a pathway from metabolic assessment and nutrition support to advances in renal replacement therapy and organ support in critical care, underling the specific clinical aspect and focusing on medical clinical management in critical care.
The proposed book presents the current state of knowledge about the processes, parameters, and phenomena that influence the fate of neonicotinoids in soil-water systems (i.
This book is one of two volumes that examines the role of political communication, media and language in transforming politics, governance and democracy in Sub-Saharan Africa.
Now in its second edition, R by Example is an example-based introduction to the statistical computing environment that does not assume any previous familiarity with R or other software packages.
This book constitutes the proceedings of the 8th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2024, held in Be'er Sheva, Israel, during December 19-20, 2024.
This book constitutes the proceedings of the 8th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2024, held in Be'er Sheva, Israel, during December 19-20, 2024.
The proposed book presents the current state of knowledge about the processes, parameters, and phenomena that influence the fate of neonicotinoids in soil-water systems (i.
Now in its second edition, R by Example is an example-based introduction to the statistical computing environment that does not assume any previous familiarity with R or other software packages.
This book draws a pathway from metabolic assessment and nutrition support to advances in renal replacement therapy and organ support in critical care, underling the specific clinical aspect and focusing on medical clinical management in critical care.
This book is one of two volumes that examines the role of political communication, media and language in transforming politics, governance and democracy in Sub-Saharan Africa.
This book constitutes the proceedings of the 26th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2024, held in Nagoya, Japan, during October 20-22, 2024.
This book provides an introduction to the theory of KMS weights and KMS states, which play an important role in mathematical physics and other applications of operator algebras.
This book provides an introduction to the theory of KMS weights and KMS states, which play an important role in mathematical physics and other applications of operator algebras.
This book constitutes the refereed proceedings of the 5th Latin American Conference on Geographical, Information Systems, GIS-LATAM 2024, held in Mexico City, Mexico, during September 2-6, 2024.
This book constitutes the refereed proceedings of the 5th Latin American Conference on Geographical, Information Systems, GIS-LATAM 2024, held in Mexico City, Mexico, during September 2-6, 2024.
This textbook introduces space vehicle maneuvering, propulsion, dynamics and control, and discusses the space environment and its influence on the spacecraft propulsion system.
This textbook introduces space vehicle maneuvering, propulsion, dynamics and control, and discusses the space environment and its influence on the spacecraft propulsion system.
This three-volume set CCIS 2366-2368 constitutes the refereed proceedings of the 6th International Conference on Computational Intelligence in Communications and Business Analytics, CICBA 2024, held in Patna, India, during January 23-25, 2024.
The book focuses on the issues of secure fusion estimation and control in cyber-physical systems under cyber-attacks, such as privacy protection under eavesdropping attacks, security fusion estimation under DoS and FDI attacks, and model-based and model-free security control under cyber-attacks.
The book focuses on the issues of secure fusion estimation and control in cyber-physical systems under cyber-attacks, such as privacy protection under eavesdropping attacks, security fusion estimation under DoS and FDI attacks, and model-based and model-free security control under cyber-attacks.
This book presents cutting-edge research addressing the mathematical models used to tackle the "e;Target problem"e; as it manifests itself in a wide range of disciplines.
The purpose of this volume is to revisit the core principle that growth is a function of communication, encapsulated in the term, negentropy, in the light of noteworthy initiatives that applied this construct in the pursuit of development goals.
The purpose of this volume is to revisit the core principle that growth is a function of communication, encapsulated in the term, negentropy, in the light of noteworthy initiatives that applied this construct in the pursuit of development goals.
This book presents cutting-edge research addressing the mathematical models used to tackle the "e;Target problem"e; as it manifests itself in a wide range of disciplines.
This book constitutes the proceedings of the 2nd International Conference on Data Security and Privacy Protection, DSPP 2024, held in Xi'an, China, during October 25-28, 2024.
This book constitutes the proceedings of the 2nd International Conference on Data Security and Privacy Protection, DSPP 2024, held in Xi'an, China, during October 25-28, 2024.
This book deeply examines the definition, formation, translation purpose, stylistic features, and modernity connotation of Liang's "e;unfettered translation.
This book deeply examines the definition, formation, translation purpose, stylistic features, and modernity connotation of Liang's "e;unfettered translation.
This book will argue that lodging is a hugely ignored, largely invisible but critical sector of housing provision and economic contributor of burgeoning African cities.