You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the refereed proceedings of the 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015. The 219 revised full papers presented together with 77 workshop papers in these four volumes were carefully reviewed and selected from 807 submissions (602 full papers and 205 workshop papers). The first volume comprises the following topics: parallel and distributed architectures; distributed and network-based computing and internet of things and cyber-physical-social computing. The second volume comprises topics such as big data and its applications and parallel and distributed algorithms. The topics of the third volume are: applications of parallel and distributed computing and service dependability and security in distributed and parallel systems. The covered topics of the fourth volume are: software systems and programming models and performance modeling and evaluation.
This book constitutes the refereed proceedings of the 9th International Conference on Applications and Techniques in Information Security, ATIS 2018, held in Nanning, China, in November 2018. The 19 full papers were carefully reviewed and selected from 59 submissions. The papers are organized in the following topical sections: information security, information abuse prevention, security implementations, knowledge discovery, and applications.
This book presents an overview of modeling and simulation of environmental systems via diverse research problems and pertinent case studies. It is divided into four parts covering sustainable water resources modeling, air pollution modeling, Internet of Things (IoT) based applications in environmental systems, and future algorithms and conceptual frameworks in environmental systems. Each of the chapters demonstrate how the models, indicators, and ecological processes could be applied directly in the environmental sub-disciplines. It includes range of concepts and case studies focusing on a holistic management approach at the global level for environmental practitioners. Features: Covers comp...
This volume constitutes the refereed proceedings of six workshops held at the 9th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2016, held in Zhangjiajie, China, in November 2016: the 7th International Workshop on Trust, Security and Privacy for Big Data, TrustData 2016; the 6th International Symposium on Trust, Security and Privacy for Emerging Applications, TSP 2016; the 4th International Workshop on Network Optimization and Performance Evaluation, NOPE 2016; the Second International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys 2016; the Annual Big Data Security, Privacy and Trust Workshop, BigDataSPT 2016; and the First International Workshop on Cloud Storage Service and Computing, WCSSC 2016. The 37 full papers presented were carefully reviewed and selected from 95 submissions. The papers deal with research findings, ideas and emerging trends in information security research and cover a broad range of topics in security, privacy and anonymity in computation, communication and storage.
This book offers a multidisciplinary look at the much-debated concept of “personalized medicine”. By combining a humanistic and a scientific approach, the book builds up a multidimensional way to understand the limits and potentialities of a personalized approach in medicine and healthcare. The book reflects on personalized medicine and complex diseases, the relationship between personalized medicine and the new bio-technologies, personalized medicine and personalized nutrition, and on some ethical, political, economic, and social implications of personalized medicine. This volume is of interest to researchers from several disciplines including philosophy, bio-medicine, and the social sciences. Chapter 16, “The Impact of Fantasy” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This volume details applications, methods, and protocols on nucleic acid amplification. Chapters detail the management of organ and stem cell transplantation, constitutional genetics and genomics, epidemiology, public health, nucleic acid detection, methods for amplification and sequencing, nuclease-assisted mutant allele enrichment, isothermal, and high-throughput sequencing. Written in the highly successful Methods in Molecular Biology series format, chapters include introductions to their respective topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory protocols, and tips on troubleshooting and avoiding known pitfalls. Cutting-edge and thorough, Clinical Applications of Nucleic Acid Amplification is a valuable resource for both novice and expert scientists in this developing field.
These conference proceedings cover recent advances in the field of developmental biology in plants. The developmental processes explored here are mainly focused on photomorphogenesis, flowering time control and the circadian clock. The book will appeal to biologists, academicians, scientists, researchers and students, as well as readers exploring the role of light in controlling various indispensable physiological processes in plants, such as flowering, circadian clock regulations and hormonal regulations. The volume also emphasises several interrelated developmental processes, such as disease development, and molecular events, including the degradation of proteins.
Selected, peer reviewed papers from the 2013 International Conference on Advances in Energy and Environmental Science (ICAEES 2013), July 30-31, 2013, Guangzhou, China