You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A selection of survey articles and original research papers in mathematical fluid mechanics, for both researchers and graduate students.
This book constitutes the refereed proceedings of the First European Workshop on Software Architecture, EWSA 2004, held in St Andrews, Scotland, UK in May 2004 in conjunction with ICSE 2004. The 9 revised full research papers, 4 revised full experience papers, and 6 revised position papers presented together with 5 invited presentations on ongoing European projects on software architectures were carefully reviewed and selected from 48 submissions. All current aspects of software architectures are addressed ranging from foundational and methodological issues to application issues of practical relevance.
The rigorous mathematical theory of the Navier–Stokes and Euler equations has been a focus of intense activity in recent years. This volume, the product of a workshop in Venice in 2013, consolidates, surveys and further advances the study of these canonical equations. It consists of a number of reviews and a selection of more traditional research articles on topics that include classical solutions to the 2D Euler equation, modal dependency for the 3D Navier–Stokes equation, zero viscosity Boussinesq equations, global regularity and finite-time singularities, well-posedness for the diffusive Burgers equations, and probabilistic aspects of the Navier–Stokes equation. The result is an accessible summary of a wide range of active research topics written by leaders in their field, together with some exciting new results. The book serves both as a helpful overview for graduate students new to the area and as a useful resource for more established researchers.
First multi-year cumulation covers six years: 1965-70.
First multi-year cumulation covers six years: 1965-70.
An accessible treatment of the main results in the mathematical theory of the Navier-Stokes equations, primarily aimed at graduate students.
The book presents various investigation into 20th-century European dictatorships, with its focus on Franco`s dictatorship and the Spanish Civil War. Francisco Franco’s dictatorship in Spain (1936/1939-1975/1978) was a modern form of authoritarianism, with a strong totalitarian period, like many other dictatorships of the time. Francoism occupies a place in history alongside other different dictatorships of its age, and a comparative analysis might prove to be a powerful tool in order to understand how, in the middle of the 20th century, such a repressive and authoritarian form of political control emerged. One of the most forgotten fascisms, which at the same time was influenced by and inf...
FIDJI 2003 was an international forum for researchers and practitioners in- rested in the advances in, and applications of, software engineering for distri- ted applicationdevelopment. Concerningthe technologies,the workshopfocused on “Java-related” technologies. It was an opportunity to present and observe the latest research, results, and ideas in these areas. Allpaperssubmittedtothisworkshopwerereviewedbyatleasttwomembers of the International Program Committee. Acceptance was based primarily on originality and contribution. We selected, for these post-workshop proceedings, 14 papers, amongst 29 submitted, two tutorials, and one keynote talk. FIDJI2003aimedatpromotingascienti?capproach...
An accessible summary of a wide range of active research topics written by leaders in their field, including exciting new results.
This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th International Workshop on Applications and Techniques in Cyber Security, ATCS 2017, and the First Workshop on Security and Privacy in the Internet Of Things, SePrIoT 2017.The 22 revised regular papers were carefully reviewed and selected from 105 submissions. The topics range from access control; language-based security; malicious software; network security; cloud security; software security; operating system security; privacy protection, database security, security models; and many more.The SePrIoT workshop targets to address novel approaches in security and privacy. The papers focuse, amongst others, on novel models, techniques, protocols, algorithms, or architectures.