You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Contains a complete and official listing of foreign consular offices in the U.S., and recognized consular officers. Includes names, addresses, and telephone numbers.
This book constitutes the refereed proceedings of the IFIP International Conference on Intelligence in Communication Systems, INTELLICOMM 2004, held in Bangkok, Thailand in November 2004. The 24 revised full papers presented together with 5 invited papers were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on QoS and security, intelligent communication systems with NLP, QoS, location and context aware services, protocol and application architectures, adaptability architectures, and network and mobility management.
In 1990, Carmelo Mesa-Lago, the foremost authority on social security in Latin America, concluded that all of the region's programs were imperiled, especially those in the most advanced nations. His study of twenty countries, originally sponsored by the United Nations Economic Commission for Latin America, critically reviews major financial problems, low and uneven population coverage, erosion in benefits, increasing costs, and the impact of social security on development.In words that eerily echo current U.S. debates, Mesa-Lago analyzes virtually all social insurance programs: old age, disability and survivors' pensions; health care; occupational hazards; family allowances; and unemployment. For social security specialists, this impressive study will serve as a comprehensive regional handbook on the legal, administrative, and financial features of Latin America's programs. Students of comparative policy and applied economics will find Mesa-Lago's methodology, analytical framework, and policy recommendations invaluable.
The Internet has nearly a ten year history as a global, public communication infrastructure. The two applications that have created the demand from private and business users have been the World-Wide Web and electronic mail. We have inthelast?veyearsseentherapidlyemergingpopularityofpeer-to-peersharing of ?les, mostly for music, and to a more limited extent also the introduction of Internet telephony, television, and radio. These services place demands on the infrastructure that are higher with respect to quality and connectivity than web sur?ng and e-mail. Mobile (cellular) telephony has rivaled the Internet with respect to growth during the last decade. The hitherto separate networks are n...
Not Born a Refugee Woman is an in-depth inquiry into the identity construction of refugee women. It challenges and rethinks current identity concepts, policies, and practices in the context of a globalizing environment, and in the increasingly racialized post-September 11th context, from the perspective of refugee women. This collection brings together scholar_practitioners from across a wide range of disciplines. The authors emphasize refugee women's agency, resilience, and creativity, in the continuum of domestic, civil, and transnational violence and conflicts, whether in flight or in resettlement, during their uprooted journey and beyond. Through the analysis of local examples and international case studies, the authors critically examine gendered and interrelated factors such as location, humanitarian aid, race, cultural norms, and current psycho-social research that affect the identity and well being of refugee women. This volume is destined to a wide audience of scholars, students, policy makers, advocates, and service providers interested in new developments and critical practices in domains related to gender and forced migrations.
The 14th volume of ToPNoC contains revised and extended versions of a selection of the best workshop and tutorial papers presented at the 39th International Conference on Application and Theory of Petri Nets and Concurrency, Petri Nets 2018, and the 18th International Conference on Application of Concurrency to System Design, ACSD 2018.The 10 papers cover a diverse range of topics including model checking and system verification, refinement, and synthesis; foundational work on specific classes of Petri nets; and innovative applications of Petri nets and other models of concurrency. Application areas covered in this volume are: process mining, verification, formal semantics, communication protocols, business processes, distributed systems, and net synthesis. Thus, this volume gives a good overview of ongoing research on concurrent systems and Petri nets.
The wait for the year 2000 was marked by the fear of possible bugs that might have arisen at its beginning. One additional fear we had during this wait was whether - ganising this event would have generated a boon or another bug. The reasons for this fear originated in the awareness that the design of interactive systems is a fast moving area. The type of research work presented at this unique event has received limited support from funding agencies and industries making it more difficult to keep up with the rapid technological changes occurring in interaction technology. However, despite our fear, the workshop was successful because of the high-quality level of participation and discussion....
This book constitutes the refereed proceedings of the Second International Conference on High Performance Computing and Communications, HPCC 2006. The book presents 95 revised full papers, addressing all current issues of parallel and distributed systems and high performance computing and communication. Coverage includes networking protocols, routing, and algorithms, languages and compilers for HPC, parallel and distributed architectures and algorithms, wireless, mobile and pervasive computing, Web services, peer-to-peer computing, and more.
Beginning with the first event in 2002, the International Conference on Wired/ Wireless Internet Communications (WWIC) has continuously been established as a highly selective conference focusing on integration and co-existence of rapidly dev- oping wireless network technologies and their applications related to the Internet. To do so WWIC provides an international forum for presenting and discussing cutti- edge research in this domain, and the 8th edition of WWIC, held at Luleå University in June 2010, continued this tradition. The WWIC 2010 call for papers attracted 45 submissions from more than 25 countries and each contribution was subject to thorough peer review by recognized int- national experts that acted as members of the Technical Program Committee. The selection process resulted in 16 accepted papers, which were thematically grouped into 5 technical sessions. The major themes of WWIC 2010 were cooperation, management of multimedia traffic, advancing IEEE 802.11, cognitive optimization, mesh and multi-hop networks, security, signaling, control, and wireless sensor networks.