You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The four-volume set LNCS 3480-3483 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2005, held in Singapore in May 2005. The four volumes present a total of 540 papers selected from around 2700 submissions. The papers span the whole range of computational science, comprising advanced applications in virtually all sciences making use of computational techniques as well as foundations, techniques, and methodologies from computer science and mathematics, such as high performance computing and communication, networking, optimization, information systems and technologies, scientific visualization, graphics, image processing, data analysis, simulation and modelling, software systems, algorithms, security, multimedia etc.
View the abstract.
This book explores the theme of the missional conversion of the church, namely how the church is transformed toward its missionary vocation, from a biblical-theological perspective. The purpose of this book is to find biblically grounded, theologically sound, and practically applicable principles helpful for the church which seeks to be continuously shaped into a missional community which authentically and fully participates in God’s mission today. The biblical-theological findings on how the triune God in the biblical narrative shapes the people of God toward their missionary vocation demonstrates, first, that, in Scripture, the missional conversion of the church is primarily the consequence of its continuous encounter with the triune God, and, second, that this divine-human encounter for the missional conversion of the church is ineluctable in view of the ongoing tension between the missional faithfulness of God in fulfilling the missionary vocation of the church, on the one hand, and the missional failure of the church in its missionary vocation, on the other hand.
View the abstract.
The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August 23-25, 2004. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research results in the area of information security applications from the academic community as well as from the industry. The workshop program covers a wide range of security aspects including cryptography, cryptanalysis, network/system security and impleme...
Nonlinear Dispersive Equations are partial differential equations that naturally arise in physical settings where dispersion dominates dissipation, notably hydrodynamics, nonlinear optics, plasma physics and Bose–Einstein condensates. The topic has traditionally been approached in different ways, from the perspective of modeling of physical phenomena, to that of the theory of partial differential equations, or as part of the theory of integrable systems. This monograph offers a thorough introduction to the topic, uniting the modeling, PDE and integrable systems approaches for the first time in book form. The presentation focuses on three "universal" families of physically relevant equation...
This book constitutes the thoroughly refereed postproceedings of the Second International Workshop on Digital Watermarking, IWDW 2003, held in Seoul, Korea, in October 2004. The 44 revised full papers presented together with 4 invited articles were carefully selected during two rounds of reviewing and improvement from more than 90 submissions. The papers address all current aspects of digital watermarking, in particular theoretical modeling, robustness, capacity, imperceptibility and the human perceptual system, security and attacks, watermarking systems and implementations, and integration of digital watermarking in digital rights management.
Asian Parenting provides a comprehensive and scholarly discussion of the distinct features, meanings, and implications for human development of contemporary Asian parenting, beyond Western theoretical frameworks. It explores how cultural beliefs and values shape socialization goals and practices and guide parent-child interactions. Edited by Xinyin Chen, contributions from leading scholars discuss key topics including conceptual and methodological issues in the study of Asian parenting; the role of social circumstances and cultural values in shaping Asian parenting; culturally prescribed socialization processes; the influence of Asian parenting on children’s socioemotional functioning, lea...
This book constitutes the refereed proceedings of the Second International Conference on Applied Cryptography and Network Security, ACNS 2004, held in Yellow Mountain, China, in June 2004. The 36 revised full papers presented were carefully reviewed and selected from 297 submissions. The papers are organized in topical sections on security and storage, provably secure constructions, Internet security, digital signatures, security modeling, authenticated key exchange, security of deployed systems, cryptosystems design and analysis, cryptographic protocols, side channels and protocol analysis, intrusion detection and DoS, and cryptographic algorithms.
Technological advancements of the past several decades in computer and telecommunication technologies have had a profound impact upon the fundamental structures of society, and particularly, upon organizations. As these technologies have matured and developed, many organizations have been looking into the organizational and managerial changes that can be made that allow the organization to achieve greater utilization of these technologies to improve their competitive postures.Web-enabled technologies have become a serious contender. Many global organizations are looking into the emerging web-enabled technologies to make their dispersed operations around the world more efficient and maintaining greater control over their resources. Those organizations that have not attempted to identify and master the many applications of web-enabled technologies will have serious difficulty competing and surviving.This book gives you the latest research findings/writings related to the web-enabled technologies utilization and management in organizations throughout the world.