You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Released in 1969, the film Battle of Britain went on to become one of the most iconic war movies ever produced. The film drew many respected British actors to accept roles as key figures of the battle, including Sir Laurence Olivier as Hugh Dowding and Trevor Howard as Keith Park. It also starred Michael Caine, Christopher Plummer and Robert Shaw as squadron leaders. As well as its large all-star international cast, the film was notable for its spectacular flying sequences which were on a far grander scale than anything that had been seen on film before. At the time of its release, Battle of Britain was singled out for its efforts to portray the events of the summer of 1940 in great accuracy...
ENACT is a research project funded by the European Commission under its H2020 program. The project consortium consists of twelve industry and research member organisations spread across the whole EU. The overall goal of the ENACT project was to provide a novel set of solutions to enable DevOps in the realm of trustworthy Smart IoT Systems. Smart IoT Systems (SIS) are complex systems involving not only sensors but also actuators with control loops distributed all across the IoT, Edge and Cloud infrastructure. Since smart IoT systems typically operate in a changing and often unpredictable environment, the ability of these systems to continuously evolve and adapt to their new environment is dec...
Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI). This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastruct...
Costing Systems provides a structured overview of costing system research to explain the co-existence of different costing practices. This body of research has come to prescriptive conclusions, which will of be valuable and insightful to practitioners designing costing systems and managers using reported cost data. The monograph is structured around four primary purposes of cost measurement: decision-making, cost management, inventory valuation for financial and tax accounting, and control and performance measurement. Part 1 of the monograph relates to the production or supply choices made by costing system designers. Part 2 moves onto the demand side for cost information. This monograph aims to be useful both to novices in the costing field who are searching for a primer on this literature as well as for people familiar with the literature who are interested in a structured overview and thoughts on where future research avenues may lead.
Modern day cellular mobile networks use Massive MIMO technology to extend range and service multiple devices within a cell. This has brought tremendous improvements in the high peak data rates that can be handled. Nevertheless, one of the characteristics of this technology is large variations in the quality of service dependent on where the end user is located in any given cell. This becomes increasingly problematic when we are creating a society where wireless access is supposed to be ubiquitous. When payments, navigation, entertainment, and control of autonomous vehicles are all relying on wireless connectivity the primary goal for future mobile networks should not be to increase the peak ...
The core of this paper is a general set of variational principles for the problems of computing marginal probabilities and modes, applicable to multivariate statistical models in the exponential family.
Marketing Manipulation deals with the tactics and strategies used by marketers that prey on human cognitive, social and memory based biases ultimately influencing consumer behavior in their favor.Kamins focuses on examples from academic research where consumers have been found to be susceptible to bias and therefore have made less than optimal purchase decisions. Particularly, academic research in the area of Pricing, Product, Promotion, Sales and marketing research. Written in an accessible manner, this book puts the consumer (you!) in the center and aims to helps making all of us a better decision maker when confronted with a range of stimuli in a marketing environment.
Globally, poor hygiene and sanitation contribute to more than 1,000 daily deaths from diarrhoeal diseases among children under the age of 5, while two thirds of urban wastewaters are discharged without treatment into lakes, rivers and coastal waters. Across Europe the percentage of the population connected to wastewater treatment plants varies from 14% to >99% with many reliant on unsuitable decentralised sanitation systems or no wastewater treatment at all. With less than a decade left to achieve the 2030 sanitation targets as set out in the Sustainable Development Goals, there is an urgent need to develop new treatment solutions that can be rapidly deployed to meet the needs of growing urb...
Architecture of a Database System presents an architectural discussion of DBMS design principles, including process models, parallel architecture, storage system design, transaction system implementation, query processor and optimizer architectures, and typical shared components and utilities.
This survey covers techniques and approaches that promise to directly enable opinion-oriented information-seeking systems.