You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Respect for patient autonomy and data privacy are generally accepted as foundational western bioethical values. Nonetheless, as our society embraces expanding forms of personal and health monitoring, particularly in the context of an aging population and the increasing prevalence of chronic diseases, questions abound about how artificial intelligence (AI) may change the way we define or understand what it means to live a free and healthy life. Who should have access to our health and recreational data and for what purpose? How can we find a balance between users' physical safety and their autonomy? Should we allow individuals to forgo continuous health monitoring, even if such monitoring may...
As software engineering (SE) becomes specialized and fragmented, it is easy to lose sight that many topics in SE have common threads and because of this, advances in one sub-discipline may transmit to another. The presentation of results between diff- ent sub-disciplines of SE encourages this interchange for the advancement of SE as a whole. Of particular interest is the hybrid approach of combining ideas from one d- cipline with those of another to achieve a result that is more significant than the sum of the individual parts. Through this hybrid philosophy, a new or common principle can be discovered which has the propensity to propagate throughout this multifaceted discipline. This volume...
This book constitutes the refereed proceedings of the Third International Conference on Wireless, Mobile Networks and Applications, WiMoA 2011, and the First International Conference on Computer Science, Engineering and Applications, ICCSEA 2011, held in Dubai, United Arab Emirates, in May 2011. The book is organized as a collection of papers from WiMoA 2011 and ICCSEA 2011. The 8 revised full papers presented in the WiMoA 2011 part were carefully reviewed and selected from 63 submissions. The 20 revised full papers presented in the ICCSEA 2011 part were carefully reviewed and selected from 110 submissions.
Electronics and Telecommunication research
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2015, held in Kochi, India, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety.
None
This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023. The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops: · 1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023) · 5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023) · 4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023) · 5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023) · 3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023) · 5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023) · 4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023) · 4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023) · 5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023)
Veterinary Toxicology, 2nd edition is a unique single reference that teaches the basic principles of veterinary toxicology and builds upon these principles to offer an essential clinical resource for those practicing in the field. This reference book is thoroughly updated with new chapters and the latest coverage of topics that are essential to research veterinary toxicologists, students, professors, clinicians and environmentalists. Key areas include melamine and cyanuric acid, toxicogenomics, veterinary medical geology, toxic gases, toxicity and safety evaluation of new veterinary pharmaceuticals and much more. The 2nd edition of this popular book represents the collective wisdom of leadin...