This book presents a careful selection of the field that very well reflects the breadth of the discipline. It covers a range ...
اقرأ المزيدIn this book, the authors introduce many properties of regular functions and generalized regular functions in real Clifford ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 10th IFIP/IEEE International Conference on Management of Multimedia ...
اقرأ المزيدThis state-of-the-art contributed volume presents a series of peer-reviewed survey articles written by international leading ...
اقرأ المزيدThis book explores the dataspace paradigm as a best-effort approach to data management within data ecosystems. It establishes ...
اقرأ المزيدThis book looks at how a democracy can devolve into a post-factual state. The media is being flooded by populist narratives, ...
اقرأ المزيدThis book deals with various computational procedures for multiple repeated analyses (reanalysis) of structures, and presents ...
اقرأ المزيدThe book provides an in-depth and uniform treatment of a mathematical model for reasoning robotic agents. The book also contains ...
اقرأ المزيدThis book presents thoroughly arranged tutorial papers corresponding to lectures given by leading researchers at the Second ...
اقرأ المزيدThis book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...
اقرأ المزيدThe present book is a festschrift in honor of Luigia Carlucci Aiello. The 18 articles included are written by former students, ...
اقرأ المزيدReceding Horizon Control introduces the essentials of a successful feedback strategy that has emerged in many industrial ...
اقرأ المزيدThis book constitutes the thoroughly refereed and extended post-proceedings of the 11th Annual ERCIM International Workshop ...
اقرأ المزيدConstitutes the extended post-proceedings of the ERCIM/CoLogNet International Workshop on Constraint Satisfaction and Constraint ...
اقرأ المزيدPrivacy in statistical databases is a discipline whose purpose is to provide - lutions to the con?ict between the increasing ...
اقرأ المزيدThis book address all aspects of constraint and logic programming, including foundational issues, implementation techniques, ...
اقرأ المزيدThis volume contains 22 peer reviewed papers from this year's conference that are organised into five sections: - Applications ...
اقرأ المزيدHere are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. Papers cover ...
اقرأ المزيدThis book presents the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took ...
اقرأ المزيدThis book presents the proceed-ings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID2006), which took ...
اقرأ المزيد