Fraud: False Representation: Knowledge of Falsity
Michigan Law Review
Denmark, 1513-1660: The Rise and Decline of a Renaissance Monarchy
Paul Douglas Lockhart
Agile Project Management with Scrum
Ken Schwaber
Developer Best Practices (1)
Applied Reinforcement Learning With Python
Taweh Beysolow Ii
Distilling Ideas: An Introduction to Mathematical Thinking
Brian P. Katz & Michael Starbird & Michael P. Starbird
The Cloud-To-Thing Continuum: Opportunities and Challenges in ...
Theo Lynn & John G. Mooney & Brian Lee & Patricia Takako Endo
Understanding Infrastructure Edge Computing: Concepts, Technologies, ...
Alex Marcham
Urban Computing
Yu Zheng
Unconventional Computing: A Volume in the Encyclopedia of Complexity ...
Andrew Adamatzky
Ubiquitous Computing
Eduard Babkin
Trusted Computing: Ein Weg zu neuen IT-Sicherheitsarc[..]
Norbert Pohlmann & Helmut Reimer
Trusted Computing
Dengguo Feng
Teaching Computing: A Practitioner's Perspective
Henry M. Walker
Spatial Computing
Shashi Shekhar & Pamela Vold
Soft Computing in Materials Development and its Sustainability ...
Amar Patnaik & Vikas Kukshal & Ankush Sharma & Mahavir Choudhary
Soft Computing Techniques in Engineering, Health, Mathematical ...
Pradip Debnath & S. A. Mohiuddine
Social Edge Computing: Empowering Human-Centric Edge Computing, ...
Dong Wang & Daniel 'Yue' Zhang
Services Computing
Liang-Jie Zhang & Jia Zhang & Hong Cai
Semantic Computing
Phillip Sheu & Heather Yu & C. V. Ramamoorthy & Arvind K. Joshi & Lotfi A. Zadeh
Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava & Uttam Ghosh & Jerry Chun-Wei Lin
Secure Edge Computing; Applications, Techniques and Challenges
Mohiuddin Ahmed & Paul Haskell-Dowland
Scientific Computing
Hamid R. Arabnia & Leonidas Deligiannidis & George Jandieri & Fernando G. Tinetti & George A. Gravvanis & Michael R. Grimaila & Douglas D. Hodson & Ashu M. G. Solo
Quantum Computing
Mika Hirvensalo
Marto Torres
Privacy-Preserving in Edge Computing
Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang