Wiley-ISTE
Aquatic Biotechnologies
Wiley-ISTEDeveloped over several decades, the concept of aquatic biotechnology refers to aquatic organisms, be they of animal or plant origin. It involves tr...
View full detailsArbitrary Lagrangian Eulerian and Fluid-Structure Interaction
Wiley-ISTEThis book provides the fundamental basics for solving fluid structure interaction problems, and describes different algorithms and numerical method...
View full detailsArchitectural Design Instruments
Wiley-ISTEWhile it is undeniable that architectural practices have been transformed with the advent of digital technologies, they nevertheless continue to oc...
View full detailsArchitecture and Governance for Communication Services
Wiley-ISTECommunication services are evolving at an unprecedented rate. No longer limited to interpersonal vocal communication, they now integrate functions ...
View full detailsArchitecture-Aware Optimization Strategies in Real-time Image Processing
Wiley-ISTEIn the field of image processing, many applications require real-time execution, particularly those in the domains of medicine, robotics and transm...
View full detailsArchives in the Digital Age
Wiley-ISTEArchiving has become an increasingly complex process. The challenge is no longer how to store the data but how to store it intelligently, in order ...
View full detailsArgument Mining
Wiley-ISTEThis book is an introduction to the linguistic concepts of argumentation relevant for argument mining, an important research and development activi...
View full detailsArticulations Between Tangible Space, Graphical Space and Geometrical Space
Wiley-ISTEThis book aims to present some of the latest research in the didactics of space and geometry, deepen some theoretical questions and open up new ref...
View full detailsArtificial and Cognitive Computing for Sustainable Healthcare Systems in Smart Cities
Wiley-ISTEArtificial and Cognitive Computing for Sustainable Healthcare Systems in Smart Cities delves into the transformative potential of artificial and co...
View full detailsArtificial Beings
Wiley-ISTEIt is almost universally agreed that consciousness and possession of a conscience are essential characteristics of human intelligence. While some b...
View full detailsArtificial Intelligence and Big Data
Wiley-ISTEWith the idea of “deep learning” having now become the key to this new generation of solutions, major technological players in the business intell...
View full detailsArtificial Intelligence in Health
Wiley-ISTEUndeniable, inescapable, exhilarating and breaking free from the exclusive domain of science, artificial intelligence has become our main preoccupa...
View full detailsArtificial Intelligence, Cybersecurity and Cyber Defence
Wiley-ISTEThe aim of the book is to analyse and understand the impacts of artificial intelligence in the fields of national security and defense; to identify...
View full detailsArtificial Materials
Wiley-ISTEThis book addresses artificial materials including photonic crystals (PC) and metamaterials (MM). The first part is devoted to design concepts: neg...
View full detailsAsia-Europe Industrial Connectivity in Times of Crisis
Wiley-ISTEThe main objective of this book is to offer an overview and a critical assessment of current connectivity issues in Asia and Europe, seen from an i...
View full detailsAssembly Language Programming
Wiley-ISTEARM designs the cores of microcontrollers which equip most "embedded systems" based on 32-bit processors. Cortex M3 is one of these designs, recent...
View full detailsAsset and Liability Management for Banks and Insurance Companies
Wiley-ISTEThis book introduces ALM in the context of banks and insurance companies. Although this strategy has a core of fundamental frameworks, models may v...
View full detailsAsymmetric Alliances and Information Systems
Wiley-ISTEThis book explores the impact of information systems on the management of North–South asymmetric strategic alliances through a series of in-depth c...
View full detailsAsymmetric Cryptography
Wiley-ISTEPublic key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption ...
View full detailsAsymptomatic Osseous Variations of the Postcranial Human Skeleton
Wiley-ISTESince ancient times, asymptomatic bone variations have been studied in many different disciplines. In radiology, for example, they enable the diffe...
View full detailsAsymptotic Analyses for Complex Evolutionary Systems with Markov and Semi-Markov Switching Using Approximation Schemes
Wiley-ISTEThis book analyzes stochastic evolutionary models under the impulse of diffusion, as well as Markov and semi-Markov switches. Models are investigat...
View full detailsAsymptotic and Analytic Methods in Stochastic Evolutionary Symptoms
Wiley-ISTEThis book illustrates a number of asymptotic and analytic approaches applied for the study of random evolutionary systems, and considers typical pr...
View full detailsAudiovisual Archives
Wiley-ISTEToday, audiovisual archives and libraries have become very popular especially in the field of collecting, preserving and transmitting cultural heri...
View full detailsAugmented Customer Strategy
Wiley-ISTEDigital transformation is shaping a new landscape for businesses and their customers. For marketing professionals, advancing technology (artificial...
View full details