WorldCat Identities

SpringerLink (Online service)

Overview
Works: 5,667 works in 6,075 publications in 1 language and 143,030 library holdings
Genres: Periodicals  Conference proceedings  Handbooks, manuals, etc 
Classifications: QA76.9.A25, 519.05
Publication Timeline
Key
Publications about SpringerLink (Online service) Publications about SpringerLink (Online service)
Publications by SpringerLink (Online service) Publications by SpringerLink (Online service)
Most widely held works by SpringerLink (Online service)
Multimedia systems by Association for Computing Machinery ( )
in English and held by 552 WorldCat member libraries worldwide
Technologies for advanced heterogeneous networks : First Asian Internet Engineering Conference, AINTEC 2005, Bangkok, Thailand, December 13-15, 2005 : proceedings by Kenjiro Cho ( )
2 editions published in 2005 in English and held by 416 WorldCat member libraries worldwide
Risk management of supply and cash flows in supply chains by Jian Li ( )
2 editions published in 2011 in English and held by 344 WorldCat member libraries worldwide
Risk management has become an essential issue in supply chain management, from the modeling of the decision maker's risk preference, and the studies on uncertain elements such as demand, supply, price, lead time, etc., to the consideration of more practical background including cash flow constraints, inventory financing and delayed cash payment. In this new volume, the authors provide a framework to study the interaction of various factors related to risk and their influence on supply chain management. The scope of areas covered includes operations management, decision analysis, and business administration. This book focuses on several key issues of risk management in supply chains. Specifically, an analysis framework is presented for studying the supplier selection problem and identifying the optimal sourcing strategy in a one-retailer two-suppliers supply chain with random yields. The optimal sourcing strategy of a retailer and the pricing strategies of two suppliers under an environment of supply disruption are investigated. Besides, the authors study the dynamic inventory control problems with cash flow constraints, financing decisions as well as delayed cash payment. In addition, originating from the annual international iron ore price negotiation, the authors model the bargaining process to deal with the risk of wholesale price in the game analysis context
Handbook of evidence-based substance abuse treatment in criminal justice settings by Carl G Leukefeld ( )
1 edition published in 2011 in English and held by 337 WorldCat member libraries worldwide
Get high. Become addicted. Commit crimes. Get arrested and be sent to jail. Get released. Repeat. It's a cycle often destined to persist, in large part because the critical step that is often missing in the process, which is treatment geared toward ensuring that addicts are able to reenter society without the constant threat of imminent relapse. The Handbook of Evidence-Based Substance Abuse Treatment in Criminal Justice Settings probes the efficacy of corrections-based drug interventions, particularly behavioral treatment. With straightforward interpretation of data that reveals what works, w
Applied mathematics and optimization ( )
and held by 331 WorldCat member libraries worldwide
Printbegrænsninger: Der kan printes kapitelvis
Trust the evolutionary game of mind and society by Toshio Yamagishi ( )
1 edition published in 2011 in English and held by 330 WorldCat member libraries worldwide
"This book is written around the central message that collectivist societies produce security, but destroy trust. In collectivist societies, people are connected through networks of strong personal ties where the behavior of all agents is constantly monitored and controlled. As a result, individuals in collectivist networks are assured that others will abide by social norms, and gain a sense of security erroneously thought of as "trust." However, this book argues that this security is not truly trust, based on beliefs regarding the integrity of others, but assurance, based on the system of mutual control within the network. In collectivist societies, security is assured insofar as people stay within the network, but people do not trust in the benevolence of human nature. On the one hand, transaction costs are reduced within collectivist networks, as once accepted into a network the risk of being maltreated is minimized. However, joining the network requires individuals to pay opportunity cost, that is, they pay a cost by forgoing potentially superior opportunities outside the security of the network. In this era of globalization, people from traditionally collectivistic societies face the challenge of learning how to free themselves from the security of such collectivistic networks in order to explore the opportunities open to them elsewhere. This book presents research investigating how the minds of individuals are shaped by the conflict between maintaining security inside closed networks of strong ties, and venturing outside of the network to seek out new opportunities."--Publisher's website
Rural families and work context and problems ( )
1 edition published in 2011 in English and held by 329 WorldCat member libraries worldwide
"The recent economic downturn has been especially devastating in America's rural areas, where low wages, sporadic seasonal work, and manufacturing industries moving their plants out of the U.S. are widespread, and grocery stores and health care services may be miles away. Many families eligible for government programs are unaware of them. The transition from welfare to work is made more difficult by not only the fewer employment opportunities, and the limited access to transportation and child care which keeps many who want to work locked in a catch-22 of unemployment. Rural Families and Work analyzes in context the issues and policies that have the greatest influence on rural employment. An overview of relevant theories provides a central starting point for discussion of work and its relationship to family and community well-being. Data from the Rural Families Speak project (including interview transcripts from study participants) illustrate the range of problems preventing rural families from finding and maintaining adequate employment. In addition, the book evaluates current proposals, pinpoints future directions for research and policy, and features discussion questions to help bring work-related issues into focus. Among the topics examined in detail: The impact of TANF, EITC, and other aid programs; The challenges of child care for low-income rural mothers; Obstacles to employment: mental health problems and child health problems; The hunger-obesity paradox and other physical health issues; Social support and resource management among rural families; Food insecurity between Latino and white populations. With its in-depth framework for understanding this complex subject, Rural Families and Work is a valuable text for family relations professors and students, and a solid reference for researchers studying social policy and the economics of the family."--Publisher's website
Decrypted secrets methods and maxims of cryptology by Friedrich Ludwig Bauer ( )
1 edition published in 2007 in English and held by 328 WorldCat member libraries worldwide
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication channels, databases, and software. Beside its role in computerized information systems (public key systems), more and more applications within computer systems and networks are appearing, which also extend to access rights and source file protection. The first part of this book treats secret codes and their uses - cryptography. The second part deals with the process of covertly decrypting a secret code - cryptanalysis - where in particular advice on assessing methods is given. The book presupposes only elementary mathematical knowledge. Spiced with a wealth of exciting, amusing, and sometimes personal stories from the history of cryptology, it will also interest general readers. Decrypted Secrets has become a standard book on cryptology. The new edition has been revised and extended in many details, particularly on the ENIGMA and other rotor machines, on cipher teletype machines, codenamed FISH by the British, and on key negotiation. "The best single book on cryptology today" (David Kahn, Cryptologia) "For those who work actively with cryptology this book is a must. For amateurs it is an important dictionary which in many cases will guide them to make their ciphers more secure." (Arne Fransén, International Intelligence History Study Group)
Bioceramics and alternative bearings in joint arthroplasty 11th BIOLOX Symposium, Rome, June 30 - July 1, 2006 : proceedings by International BIOLOX Symposium ( )
2 editions published in 2006 in English and held by 327 WorldCat member libraries worldwide
Presents the source of scientific and clinical information regarding the use of ceramics and other alternative bearings in joint replacement surgery. This book presents the proceedings of a Symposium that pays tribute and recognition to the many innovations and contributions that have been developed by the Italian Orthopedic Surgical Community
A new unified theory of psychology by Gregg Henriques ( )
1 edition published in 2011 in English and held by 326 WorldCat member libraries worldwide
Concern about psychology's fragmentation is not new, but there has for the past decade been increasing calls for psychologists to acknowledge to the costs associated with fragmentation and to search for ways to unify the discipline. A New Unified Theory of Psychology introduces a new system that addresses psychology's current theoretical and philosophical difficulties. The new theory consists of four interlocking pieces that together provide--for the first time--a macro-level view that clarifies the nature of psychology's problems and offers a clear way to unify the various elements of the field. The unified theory provides the field of psychology with a well-defined subject matter, allowing both academic and professional psychologists will be able to develop a shared language and conceptual foundation. -- Book Description
The virtual future by William Sims Bainbridge ( )
1 edition published in 2011 in English and held by 326 WorldCat member libraries worldwide
Annotation
Innovation in product design from CAD to virtual prototyping by Monica Bordegoni ( )
3 editions published in 2011 in English and held by 325 WorldCat member libraries worldwide
Innovation in Product Design gives an overview of the research fields and achievements in the development of methods and tools for product design and innovation. It presents contributions from experts in many different fields covering a variety of research topics related to product development and innovation. Product lifecycle management, knowledge management, product customization, topological optimization, product virtualization, systematic innovation, virtual humans, design and engineering, and rapid prototyping are the key research areas described in the book. It also details successful ca
Rural caregiving in the United States research, practice, policy by Ronda C Talley ( )
1 edition published in 2011 in English and held by 324 WorldCat member libraries worldwide
Beginning 3D game development with Unity the world's most widely used multi-platform game engine by Sue Anne Batey Blackman ( )
1 edition published in 2011 in English and held by 324 WorldCat member libraries worldwide
The text introduces key game production concepts and teaches the basic scripting skills to be used with Unity. It also shows how to create casual interactive adventure games in the style of Telltale Games' Tales of Monkey Island, thus giving the reader a foundation in game logic and design
Foundations of SQL Server 2008 R2 business intelligence by Guy Fouché ( )
1 edition published in 2011 in English and held by 322 WorldCat member libraries worldwide
Annotation
Image processing based on partial differential equations proceedings of the International Conference on PDE-Based Image Processing and Related Inverse Problems, CMA, Oslo, August 8-12, 2005 by Xue-Cheng Tai ( )
2 editions published in 2007 in English and held by 321 WorldCat member libraries worldwide
This book publishes a collection of original scientific research articles that address the state-of-art in using partial differential equations for image and signal processing. The topics covered in this book include: level set methods for image segmentation and construction, denoising techniques, digital image inpainting, image dejittering, image registration, and fast numerical algorithms for solving these problems. The book is suitable for readers working with computer vision and visualization, image and signal processing, as well as medical imaging and numerical mathematics. The partial differential equations used for different problems discussed in this proceeding provide some rich research topics for people working with mathematical analysis and numerical simulations. This volume collects new developments in this field and points to the newest literature results. It is good resource for people working on related problems as well as for people who are new in this field
Beginning Windows Phone 7 development by Henry Lee ( )
1 edition published in 2011 in English and held by 320 WorldCat member libraries worldwide
Provides information on designing and implementing working applications for Windows Phone 7
Ontology-based application integration by Heiko Paulheim ( )
1 edition published in 2011 in English and held by 320 WorldCat member libraries worldwide
Lossy image compression domain decomposition-based algorithms by K. K Shukla ( )
1 edition published in 2011 in English and held by 319 WorldCat member libraries worldwide
Recent trends of mobile collaborative augmented reality systems by Leila Alem ( )
1 edition published in 2011 in English and held by 318 WorldCat member libraries worldwide
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.66 (from 0.59 for Beginning ... to 0.76 for Image proc ...)
Alternative Names

controlled identity LINK (Online service)

Springer-Verlag. SpringerLink
Languages
English (26)
Covers