Browse Results

Help

Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the Help Center.

Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.

  • Bookshare Web Reader - A customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
  • DAISY (Digital Accessible Information System) - A digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
  • BRF (Braille Refreshable Format) - Digital Braille for use with refreshable Braille devices and Braille embossers.
  • MP3 (MPEG audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
  • DAISY Audio - Similar to the DAISY option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivonas Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.
  • EPUB - A standard e-book format that can be read on many tools, such as iBooks, Readium or others.
  • Word - Accessible Word output, which can be unzipped and opened in any tool that allows .docx files
Showing 1 through 25 of 16,821 results

An Archaeology of the Margins: Colonialism, Amazighity and Heritage Management in the Canary Islands (SpringerBriefs in Archaeology)

by A. José Farrujia de la Rosa

This book analyses the problematics of archaeological heritage management in the Canary Islands, which are echoed in other parts of the world where the indigenous heritage is under-represented. The present-day management of Canarian archaeological heritage has a very specific and unusual context given that the archipelago is located on the fringes of Europe, belonging to Spain and therefore to the European Unión, but geographically and in terms of early history being part of Africa. From a theoretical perspective, then, the proposed book analyzes issues such as the effects of colonialism and eurocentrism on the management of the archaeological heritage. It also examines the evolutionist and historico-cultural models used to analyze past societies and, ultimately, used to create identities that influence archaeological heritage management itself. From a practical point of view, the book presents a proposal for enhancing the archaeological heritage of the Canary Islands through the creation of archaeological parks (providing some concrete examples in the case of the city of La Laguna) and the active involvement of the local community. Parallel to this, the book considers the Canarian Archipelago as part of a problematic that is not unique to this area but is an example of poor indigenous heritage management overall. It demonstrates how the course of history and the politics of the past still have an excessive influence on the way in which the present-day archaeological heritage is interpreted and managed. Therefore, this book provides an almost unique opportunity for uncovering the history of archaeology within the margins of Europe (in fact, in an African region) and exploring colonial and foreign influences. In many ways it is a mirror of archaeological mainstreams and an exercise in (re)thinking the aim and status of present-day archaeology.

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

by Monnappa K A

Understand malware analysis and its practical implementationKey FeaturesExplore the key concepts of malware analysis and memory forensics using real-world examplesLearn the art of detecting, analyzing, and investigating malware threatsUnderstand adversary tactics and techniquesBook DescriptionMalware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches.This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics. This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, infected memory images, and visual diagrams to help you gain a better understanding of the subject and to equip you with the skills required to analyze, investigate, and respond to malware-related incidents.What you will learnCreate a safe and isolated lab environment for malware analysisExtract the metadata associated with malwareDetermine malware's interaction with the systemPerform code analysis using IDA Pro and x64dbgReverse-engineer various malware functionalitiesReverse engineer and decode common encoding/encryption algorithmsPerform different code injection and hooking techniquesInvestigate and hunt malware using memory forensicsWho this book is forThis book is for incident responders, cyber-security investigators, system administrators, malware analyst, forensic practitioners, student, or curious security professionals interested in learning malware analysis and memory forensics. Knowledge of programming languages such as C and Python is helpful but is not mandatory. If you have written few lines of code and have a basic understanding of programming concepts, you’ll be able to get most out of this book.

You Say More Than You Think: Use the New Body Language to Get What You Want!, The 7-Day Plan

by Mariska Van Aalst Janine Driver

Now You're Talking!Do you want to be bulletproof at work, secure in your relationship, and content in your own skin? If so, it's more important than ever to be aware of what your body is saying to the outside world. Unfortunately, most of what you've heard from other body language experts is wrong, and, as a result, your actions may be hurting, not helping, you. With sass and a keen eye, media favorite Janine Driver teaches you the skills she used every day to stay alive during her fifteen years as a body-language expert at the ATF. Janine's 7-day plan and her 7-second solutions teach you dozens of body language fixes to turn any interpersonal situation to your advantage. She reveals methods here that other experts refuse to share with the public, and she debunks major myths other experts swear are fact: Giving more eye contact is key when you're trying to impress someone. Not necessarily true. It's actually more important where you point your belly button. This small body shift communicates true interest more powerfully than constant eye contact.The "steeple" hand gesture will give you the upper hand during negotiations and business meetings. Wrong. Driver has seen this overbearing gesture backfire more often than not. Instead, she suggests two new steeples that give you power without making you seem overly aggressive: the Basketball Steeple and the A-OK Two-Fingered Steeple. Happy people command power and attention by smiling just before they meet new people. Studies have shown that people who do this are viewed as Beta Leaders. Alpha leaders smile once they shake your hand and hear your name. At a time when every advantage counts--and first impressions matter more than ever--this is the book to help you really get your message across.From the Hardcover edition.

Whispers Under Ground: Rivers Of London, Moon Over Soho, Whispers Under Ground (Rivers of London #3)

by Ben Aaronovitch

A WHOLE NEW REASON TO MIND THE GAP It begins with a dead body at the far end of Baker Street tube station, all that remains of American exchange student James Gallagher—and the victim’s wealthy, politically powerful family is understandably eager to get to the bottom of the gruesome murder. The trouble is, the bottom—if it exists at all—is deeper and more unnatural than anyone suspects . . . except, that is, for London constable and sorcerer’s apprentice Peter Grant. With Inspector Nightingale, the last registered wizard in England, tied up in the hunt for the rogue magician known as “the Faceless Man,” it’s up to Peter to plumb the haunted depths of the oldest, largest, and—as of now—deadliest subway system in the world. At least he won’t be alone. No, the FBI has sent over a crack agent to help. She’s young, ambitious, beautiful . . . and a born-again Christian apt to view any magic as the work of the devil. Oh yeah—that’sgoing to go well.

Nadie debería irse a dormir

by Álvaro Abad

Asesinatos y tramas de corrupción bajo los espectaculares viñedos y las mejores bodegas de nuestro país UN CADÁVER EN LOS VIÑEDOS DE LA RIOJA Una mañana, el cuerpo de Norberto Obanos, un importante bodeguero de La Rioja, aparece sin vida en su lujoso despacho. Antes de morir Obanos hizo una llamada y dejó en el contestador un mensaje: «Medusa». Todo apunta a un suicidio; sin embargo, es la tercera persona que muere en circunstancias parecidas. UN POLICÍA RETIRADO Para llevar a cabo la investigación, el jefe de policía de la zona llama a Trejo, un policía prejubilado. Trejo sale de su retiro por dos llamadas: la de la policía y la de su hija Irina, con quien mantiene una relación ambivalente y distante. Trejo vive solo, nada se sabe de su ex mujer, pero su ausencia pesa entre los dos. Irina lleva una vida itinerante, vinculada a grupos de izquierda. Con su habilidad e intuición, Trejo descubre que las coincidencias entre las víctimas van más allá del modo en que murieron. Trejo descubre que los tres tuvieron algún tipo de conexión con el Estado... y que detrás de todo ello se lee la firma de un tal «Lobo», que opera desde el pasado y el rencor. Y UNA CADENA DE ASESINATOS QUE COMPARTEN UN CÓDIGO SECRETO: MEDUSA En Nadie debería irse a dormir, el lector baja a las alcantarillas del poder para retratar las zonas de sombra, aquellas donde se firman pactos secretos y se reparten privilegios en virtud de una idea de estabilidad que atenta contra la de justicia. Por otro lado, en el caso de los crímenes de bodegueros riojanos se habla de una mezcla de corrupción política y económica con las mafias internacionales sobre un escenario de lo más reconocible: los viñedos de La Rioja, uno de los estandartes turísticos, financieros y culturales de este país.

Drug Use and Abuse: A Comprehensive Introduction (8th Edition)

by Howard Abadinsky

Packed with the latest data and research, the powerful new DRUG USE AND ABUSE: A COMPREHENSIVE INTRODUCTION, 8e delivers a thorough, interdisciplinary survey of all aspects of drug and alcohol abuse. The text draws from the many disciplines of history, law, pharmacology, political science, social work, counseling, psychology, sociology, and criminal justice--resulting in the most comprehensive, authoritative single source available. It explores the history of drugs, their impact on society, the pharmacological impact of drugs on the body, drug policy implications, the criminal justice system response, the drug business, law enforcement, theories of use, as well as the effects, treatment, and prevention of abuse. New coverage includes nonmedical use of prescription drugs, synthetic substances, the use of stimulants to treat PTSD and ADD, medical marijuana, the connection between drug trafficking and terrorism, and an updated analysis of the United States drug policy.

25 cuentos traviesos para leer en 5 minutos

by Amaia Cia Abascal Núria Aparicio

25 cuentos breves para leer a los niños antes de ir a dormir Érase una vez un príncipe normal con un deseo muy raro; érase una vez una princesa comilona, y una vaca rechoncha, y un emperador con un traje viejo, y un patito feo de verdad, y una bruja buena, y un elefante, y un ogro... Sus aventuras duran cinco minutos, que es lo mismo que tú tardas en irte a dormir. ¿Por cuál quieres que empecemos?

Applications and Usability of Interactive TV: 4th Iberoamerican Conference, jAUTI 2015, and 6th Congress on Interactive Digital TV, CTVDI 2015, Palma de Mallorca, Spain, October 15-16, 2015. Revised Selected Papers (Communications in Computer and Information Science #605)

by María José Abásolo Francisco J. Perales Antoni Bibiloni

This book constitutes the refereed proceedings of the 4th Iberoamerican Conference on Applications and Usability of Interactive TV, jAUTI 2015, and the 6th Congress on Interactive Digital TV, CTVDI 2015, held in Palma de Mallorca, Spain, in October 2015. The 10 revised full papers and two short papers presented together with an invited talk were carefully reviewed and selected for this volume from 30 accepted submissions. The papers are organized in topical sections on Second Screen Applications Immersive TV; Video Consumption Development Tools; IDTV Interoperability; IDTV User Experience; Audiovisual Accessibility.

Foundations of Multiattribute Utility

by Ali E. Abbas

Many of the complex problems faced by decision makers involve uncertainty as well as multiple conflicting objectives. This book provides a complete understanding of the types of objective functions that should be used in multiattribute decision making. By using tools such as preference, value, and utility functions, readers will learn state-of-the-art methods to analyze prospects to guide decision making and will develop a process that guarantees a defensible analysis to rationalize choices. Summarizing and distilling classical techniques and providing extensive coverage of recent advances in the field, the author offers practical guidance on how to make good decisions in the face of uncertainty. This text will appeal to graduate students and practitioners alike in systems engineering, operations research, business, management, government, climate change, energy, and healthcare.

Aortic Stenosis: Case-Based Diagnosis and Therapy

by Amr E. Abbas

With the advent of less invasive treatments for aortic stenosis including percutaneous and apical replacement, more patients are being offered this technology. As such, determining the true severity of aortic stenosis is becoming paramount. Many clinical scenarios occur where the area and gradient estimates of severity do not match. This book will present case by case examples of different patients with a wide variety of aortic stenosis. It will assist cardiologists in identifying patients with true aortic stenosis who may benefit from valve replacement. It will also highlight the role and advent of new technology as the role of CTA, MRI, and 3D echo for diagnosis and TAVR and mini surgery for treatment. The audience will range from clinical cardiologists,imaging cardiologists and interventionalists alike.

Advanced Functional Evolution Equations and Inclusions (Developments in Mathematics #39)

by Saïd Abbas Mouffak Benchohra

This book presents up-to-date results on abstract evolution equations and differential inclusions in infinite dimensional spaces. It covers equations with time delay and with impulses, and complements the existing literature in functional differential equations and inclusions. The exposition is devoted to both local and global mild solutions for some classes of functional differential evolution equations and inclusions, and other densely and non-densely defined functional differential equations and inclusions in separable Banach spaces or in Fréchet spaces. The tools used include classical fixed points theorems and the measure-of non-compactness, and each chapter concludes with a section devoted to notes and bibliographical remarks. This monograph is particularly useful for researchers and graduate students studying pure and applied mathematics, engineering, biology and all other applied sciences.

Biogas Energy (SpringerBriefs in Environmental Science #2)

by Tasneem Abbasi S. M. Tauseef S. A. Abbasi

In recent years, the importance of biogas energy has risen manifold and has become universal. This is due to the realization that biogas capture and utilization has great potential in controlling global warming. By capturing biogas wherever it is formed, we not only tap a source of clean energy, but we also prevent the escape of methane to the atmosphere. Given that methane has 25 times greater global warming potential than CO2, methane capture through biogas energy in this manner can contribute substantially towards global warming control.

Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems

by Hussein A. Abbass

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT). The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making systems. He presents the Shadow CRT Machine, which shadows the operations of an actual system to think with decision makers, challenge threats, and design remedies. This is the first book to generalize red teaming (RT) outside the military and security domains and it offers coverage of RT principles, practical and ethical guidelines. The author utilizes Gilbert's principles for introducing a science. Simplicity: where the book follows a special style to make it accessible to a wide range of readers. Coherence: where only necessary elements from experimentation, optimization, simulation, data mining, big data, cognitive information processing, and system thinking are blended together systematically to present CRT as the science of Risk Analytics and Challenge Analytics. Utility: where the author draws on a wide range of examples, ranging from job interviews to Cyber operations, before presenting three case studies from air traffic control technologies, human behavior, and complex socio-technical systems involving real-time mining and integration of human brain data in the decision making environment.

Advances in Acoustics and Vibration: Proceedings of the International Conference on Acoustics and Vibration (ICAV2016), March 21-23, Hammamet, Tunisia (Applied Condition Monitoring #5)

by Mohamed Slim Abbes Fakher Chaari Mohamed Haddar Tahar Fakhfakh Lasaad Walha Moez Abdennadher

The book provides readers with a snapshot of recent research and industrial trends in field of industrial acoustics and vibration. Each chapter, accepted after a rigorous peer-review process, reports on a selected, original piece of work presented and discussed at International Conference on Acoustics and Vibration (ICAV2016), which was organized by the Tunisian Association of Industrial Acoustics and Vibration (ATAVI) and held March 21-23, in Hammamet, Tunisia. The contributions, mainly written by north African authors, covers advances in both theory and practice in a variety of subfields, such as: smart materials and structures; fluid-structure interaction; structural acoustics as well as computational vibro-acoustics and numerical methods. Further topics include: engines control, noise identification, robust design, flow-induced vibration and many others. This book provides a valuable resource for both academics and professionals dealing with diverse issues in applied mechanics. By combining advanced theories with industrial issues, it is expected to facilitate communication and collaboration between different groups of researchers and technology users.

The Royal Governors of Georgia, 1754-1775

by W. W. Abbot

The political history of Georgia--the youngest and smallest of the thirteen colonies--condenses into a relatively short span much of the colonial history of America. Abbot's study of the colony of Georgia, from the time it came under the administration of the Crown in 1754 until the beginning of the American Revolution, tells the story of unprecedented expansion and growth against a backdrop of fast-developing crisis throughout the Empire.Originally published in 1959.A UNC Press Enduring Edition -- UNC Press Enduring Editions use the latest in digital technology to make available again books from our distinguished backlist that were previously out of print. These editions are published unaltered from the original, and are presented in affordable paperback formats, bringing readers both historical and cultural value.

Give Me Your Hand

by Megan Abbott

A life-changing secret destroys an unlikely friendship in this "magnetic" (Meg Wolitzer) psychological thriller from the Edgar Award-winning author of Dare Me. <P><P>Kit Owens harbored only modest ambitions for herself when the mysterious Diane Fleming appeared in her high school chemistry class. But Diane's academic brilliance lit a fire in Kit, and the two developed an unlikely friendship. <P><P>Until Diane shared a secret that changed everything between them. <P><P>More than a decade later, Kit thinks she's put Diane behind her forever and she's begun to fulfill the scientific dreams Diane awakened in her. But the past comes roaring back when she discovers that Diane is her competition for a position both women covet, taking part in groundbreaking new research led by their idol. <P><P>Soon enough, the two former friends find themselves locked in a dangerous game of cat-and-mouse that threatens to destroy them both.

Queenpin: A Novel (Thorndike Mystery Ser.)

by Megan Abbott

Re-released to coincide with Abbott's newest novel, Dare Me, this eBook edition of Queenpin also includes the original short story, "Policy," that the novel was based on.A young woman hired to keep the books at a down-at-the-heels nightclub is taken under the wing of the infamous Gloria Denton, a mob luminary who reigned during the Golden Era of Bugsy Siegel and Lucky Luciano. Notoriously cunning and ruthless, Gloria shows her eager young protÉgÉe the ropes, ushering her into a glittering demimonde of late-night casinos, racetracks, betting parlors, inside heists, and big, big money. Suddenly, the world is at her feet--as long as she doesn't take any chances, like falling for the wrong guy. As the roulette wheel turns, both mentor and protÉgÉe scramble to stay one step ahead of their bosses and each other.

Collaboration, Learning and Innovation Across Outsourced Services Value Networks: Software Services Outsourcing in China (SpringerBriefs in Digital Spaces)

by Pamela Abbott Yingqin Zheng Rong Du

This book collects and reports on the results of a study conducted on the Chinese Software and Services Outsourcing (SSO) industry, focusing on one of its main players as a key case study. Two sets of research findings are presented: first, the knowledge management and communication processes inherent within a highly collaborative software development project between the case study company and one of its long-term UK clients are explored and distilled into specific practices; second, at the organizational level, the strategies used by the company to build and exploit capabilities and to dynamically configure resources to promote specific value positions along its outsourced services value networks are identified and discussed. The significance of these findings for similar China-based global high-tech firms and the value of this organizational form in moving closer to the goals of the 2020 enterprise vision are both discussed, along with the implications of the findings for EU/UK businesses operating in similar digital domains.

Cracked Classics: Six Books in One (Cracked Classics #3)

by Tony Abbott

When two sixth-grade friends magically enter classic literary books, their fun-filled adventures are “a treat for reluctant readers” (School Library Journal). They just didn’t want to read the books! Instead, through their school library’s magic security gates, sixth graders Devin and Frankie—short for Francine—are zapped into great works of literature and new worlds of adventure, including Dracula, The Adventures of Tom Sawyer, Around the World in Eighty Days, A Christmas Carol, Treasure Island, and Romeo and Juliet. “The message that reading is important and can be fun comes through loud and clear” (School Library Journal). Trapped in Transylvania: Transported into Bram Stoker’s vampire classic, the sarcastic sixth graders will need a few stakes, a lot of garlic, and a sharp sense of humor to defeat the bloodthirsty Count Dracula. Mississippi River Blues: These modern middle schoolers learn being a troublemaker is timeless, as they whitewash a fence, run away from home, solve a murder, become pirates, and search for hidden treasure along with Tom and Huck, the original slackers. What a Trip!: When you can travel into books, going around the world is easy. In the company of mad explorer Phileas Fogg, Devin and Frankie embark on a round-the-world journey by train, ship, and hot air balloon. Humbug Holiday: For two sixth graders who feel about school the way Scrooge feels about Christmas, an enchanted trip into Charles Dickens’s tale is just what their spirits need. X Marks the Spot: Devin and Frankie become marooned middle schoolers when they are swept away to Treasure Island and must match wits with legendary pirate Long John Silver. Crushing on a Capulet: Devin and Frankie try to save star-crossed lovers Romeo and Juliet when they find themselves in Shakespeare’s classic play.

Danger Guys: The Complete Series (Danger Guys #1)

by Tony Abbott

Their first names are Noodle and Zeek, but their middle names are “Danger”—in this “exciting” series from the author of the Secrets of Droon (Booklist). Best buddies Noodle and Zeek love adventure—and that’s a good thing, because they clearly can’t stay out of trouble. “A throwback to the Hardy Boys” mixed with “plotting reminiscent of Saturday-morning cartoons,” award-winning author Tony Abbott’s high-energy series is pure fun (Booklist). This complete set of all six books kicks off with Danger Guys, a “good-natured parody of the likes of Indiana Jones films” (Publishers Weekly). Danger Guys: Best friends Noodle and Zeek are among the first in line when a new store selling survival gear, Danger Guy, opens in their mall. But when a small room in the store turns out to be the back of a truck, they’re in for a terrifying ride to an ancient temple full of treasures. Danger Guys Blast Off: When Noodle and Zeek discover their old science teacher is actually an evil scientist who wants to blow up their school, they must defeat a giant robot, learn to fly a rocket, and defuse the bomb before it’s too late. Danger Guys: Hollywood Halloween: The boys can’t wait to tour a real Hollywood movie studio—until electronic props go haywire and the friends must battle an evil robot, a sneezing dinosaur, and a deadly mummy. Danger Guys Hit the Beach: Noodle and Zeek are about to discover that stopping treasure hunters is no day at the beach. Danger Guys on Ice: On a skiing trip, the boys stumble upon frozen cavemen—and their cold-blooded former science teacher, the evil Mr. Vazny, who plans to reanimate the cavemen and use them to destroy Mayville. Danger Guys and the Golden Lizard: On a jungle quest for the legendary Golden Lizard, the boys must rescue a kidnapped husband-and-wife explorer team, fight off ninja linebackers, and find the treasure before the bad guys.

The Weird Zone: The Complete Series (The Weird Zone #8)

by Tony Abbott

Think your town is weird? Step into Grover’s Mill—known to the local kids as the “Weird Zone”—from the award-winning author of the Secrets of Droon series. There’s no place like home. Seriously, there’s no place like the bizarre town of Grover’s Mill, home to friends Liz, Holly, Sean, Jeff, and Mike—but also to aliens, monsters, dinosaurs, giant robots, and a potato capable of mind control. It could have something to do with the location—in the middle of a triangle containing a secret UFO testing base, a dinosaur burial ground, and a cheesy horror movie studio. Whatever the reason, enter at your own risk . . . Zombie Surf Commandos from Mars!: When disgusting alien zombies start rising from the lake, Holly, Liz, and Jeff must escape—or their brains will become an afternoon snack. The Incredible Shrinking Kid!: After a blast of purple light zaps Holly’s brother, Sean—shrinking him to four inches—the friends need to make sure he doesn’t end up in an evil toy-store owner’s collection. The Beast from Beneath the Cafeteria!: Liz and her friends battle a dinosaur with a craving for junk food—and an appetite for destruction. Attack of the Alien Mole Invaders!: Not to make a mountain out of a molehill—but a colony of giant moles from outer space has tunneled under Grover’s Mill. With the help of a secret government invention, Jeff and Holly must stop them in their tracks. The Brain That Wouldn’t Obey!: Mike is sure he’s going to win the school science fair with his potato-powered radio, “Potadio.” But when his invention is electrocuted to life and takes over the minds of the teachers and students, it’s boy vs. spud. Gigantopus from Planet X!: When Sean and Holly must battle a gigantic robot octopus controlled by an evil alien, it sucks big-time. Cosmic Boy Versus Mezmo Head!: After an alien blasts Jeff with an X-ray on his way to audition for his school’s outer space version of The Wizard of Oz, his favorite childhood toy, a Cosmic Boy space helmet, gets stuck on his head. The space invader has his own mind-controlling Mezmo head helmet, and now the two will butt heads . . . or, uh, helmets. Revenge of the Tiki Men!: There’s no time to lounge around—huge Tiki heads with a grudge against Grover’s Mill are turning the town back into a jungle. It’s up to the kids to fend off a total disaster.

Anal Fistula: Principles and Management

by Herand Abcarian

Anal Fistula: Principles and Management provides a comprehensive and state of the art review of major issues specific and related to the treatment of anal fistulas. An important section of the book covers the large number of alternative procedures which have been developed in the last two decades. Needless to say, none of these procedures have been uniformly successful, otherwise there would be no need for all the different operations. The book addresses each alternative procedure, discusses the benefits of each procedure, includes the most up-to-date results. Other important chapters cover the causes and failure of treatment and operations for fistulas. Also included is a Cochrane Review of all available randomized controlled trials with levels of evidence culled from the literature. Written by specialists in their respective fields, Anal Fistula: Principles and Management fills a void in available texts on a subject matter very commonly encountered by surgeons, physicians and specialists. ​ ​​

Public-Key Cryptography – PKC 2018: 21st Iacr International Conference On Practice And Theory Of Public-key Cryptography, Rio De Janeiro, Brazil, March 25-29, 2018, Proceedings (Lecture Notes In Computer Science #10770)

by Michel Abdalla Ricardo Dahab

The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018. The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Protocols; Blockchain; Zero-Knowledge; Lattices.

Public-Key Cryptography – PKC 2018: 21st Iacr International Conference On Practice And Theory Of Public-key Cryptography, Rio De Janeiro, Brazil, March 25-29, 2018, Proceedings (Lecture Notes In Computer Science #10770)

by Michel Abdalla Ricardo Dahab

The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018. The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Protocols; Blockchain; Zero-Knowledge; Lattices.

Design and Implementation of Practical Schedulers for M2M Uplink Networks

by Ahmed Abdelhadi T. Charles Clancy Akshay Kumar

This book presents the design of delay-efficient packet schedulers for heterogeneous M2M uplink traffic classified into several classes, based on packet delay requirements, payload size, arrival process, etc. Specifically, the authors use tools from queuing theory to determine the delay-optimal scheduling policy. The proposed packet schedulers are designed for a generic M2M architecture and thus equally applicable to any M2M application. Additionally, due to their low implementation complexity and excellent delay-performance, they authors show how they are also well-suited for practical M2M systems. The book pertains primarily to real-time process scheduler experts in industry/academia and graduate students whose research deals with designing Quality-of-Service-aware packet schedulers for M2M packet schedulers over existing and future cellular infrastructure. Presents queuing theoretic analysis and optimization techniques used to design proposed packet scheduling strategies;Provides utility functions to precisely model diverse delay requirements, which lends itself to formulation of utility-maximization problems for determining the delay- or utility-optimal packet scheduler;Includes detail on low implementation complexity of the proposed scheduler by using iterative and distributed optimization techniques.

Refine Search

Showing 1 through 25 of 16,821 results