This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. …
This book constitutes the refereed proceedings fo the 14th International Scientific Conference on Information Technologies and Mathematical Modeling, named after A. F. Terpugov, ITMM 2015, held in Anzhero-Sudzhensk, Russia, in November 2015. The 35 full papers included in this volume were carefully reviewed and selected from 89 submissions. They are devoted to new results in the queueing the…
This book constitutes the thoroughly refereed revised selected papers of the 15th International Symposium on Trends in Functional Programming, TFP 2014, held in Soesterberg, The Netherlands, in May 2014. The 8 revised full papers included in this volume were carefully and selected from 22 submissions. TFP is an international forum for researchers with interests in all aspects of functional prog…
From reviews of Deer, eds., Comprehensive Treatment of Chronic Pain by Medical, Interventional, and Integrative Approaches: "Comprehensive Treatment of Chronic Pain by Medical, Interventional, and Integrative Approaches is a major textbook... [I]t should be a part of all departmental libraries and in the reference collection of pain fellows and pain practitioners. In fact, this text could …
Treatment of Benign Prostatic Hyperplasia: Modern Techniques is an up-to-date review of modern techniques used to treat benign prostatic hyperplasia. It provides a comprehensive review of both office and operating room based techniques. Both electrosurgical and laser based techniques are covered. These include high powered 532 nm laser photoselective laser vaporization of the prostate (PVP), ho…
What is at stake for how the Internet continues to evolve is the preservation of its integrity as a single network. In practice, its governance is neither centralised nor unitary; it is piecemeal and fragmented, with authoritative decision-making coming from different sources simultaneously: governments, businesses, international organisations, technical and academic experts, and civil society.…
Metode bioinformatika menjadi bagian dari kotak peralatan standar laboratorium Ilmu Hayati. Diterapkan dengan bijak, pendekatan ini dapat sangat membatasi pekerjaan eksperimental dan melengkapi hasil yang diperoleh dengan metode "basah". Sementara banyak metode dan protokol bioinformatika belum cukup matang untuk digunakan oleh non-bioinformatika (dalam hal implementasi, atau kemudahan interpre…
This is the only introduction you'll need to start programming in R, the open-source language that is free to download, and lets you adapt the source code for your own requirements. Co-written by one of the R Core Development Team, and by an established R author, this book comes with real R code that complies with the standards of the language. Unlike other introductory books on the ground-brea…
Now in its second edition, this textbook serves as an introduction to probability and statistics for non-mathematics majors who do not need the exhaustive detail and mathematical depth provided in more comprehensive treatments of the subject. The presentation covers the mathematical laws of random phenomena, including discrete and continuous random variables, expectation and variance, and commo…
In this Festschrift celebrating the career of Thom H. Dunning, Jr., selected researchers in theoretical chemistry present research highlights on major developments in the field. Originally published in the journal Theoretical Chemistry Accounts, these outstanding contributions are now available in a hardcover print format, as well as a special electronic edition. This volume provides valuable c…