This carefully edited book presents how natural groupings such as fish schools, bird flocks, deer herds etc. coordinate themselves ...
اقرأ المزيد
In today’s world of ubiquitously connected heterogeneous information systems and computing devices, the intelligent coordination ...
اقرأ المزيد
In today’s world of ubiquitously connected heterogeneous information systems and computing devices, the intelligent coordination ...
اقرأ المزيد
This book provides an insight in the basic understanding of cooperative systems as well as in theory, modeling, and applications ...
اقرأ المزيد
Challenges arise when the size of a group of cooperating agents is scaled to hundreds or thousands of members. In domains ...
اقرأ المزيدThis volume aims to describe a variety of techniques that reflects the wide range of research currently performed in the ...
اقرأ المزيد
Aims to describe a variety of techniques that reflects the wide range of research currently performed in the field of coronavirology, ...
اقرأ المزيد
Provides an extensive overview of the most recent technological advancements in facial plastic and reconstructive surgeries ...
اقرأ المزيد
Build and program MINDSTORM NXT robots with Daniele Benedettelli, one of the world's most respected NXT robot builders. ...
اقرأ المزيد
How do scientists use analogies and other processes to break away from old theories and generate new ones? This book documents ...
اقرأ المزيد
Prevention and preparedness are the two basic approaches to maximize food security against any sort of tampering, whether ...
اقرأ المزيد
Focuses on methods and techniques for crowd simulation, filling the gap in the professional literature. This survey covers ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
اقرأ المزيد
This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
اقرأ المزيد
This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
اقرأ المزيد
A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيد
This book constitutes the thoroughly refered post-proceedings of the 11th Conference of the Spanish Association for Artificial ...
اقرأ المزيد
This volume represents a collection of topics on natural killer cells, mast cells, phagocytes, toll like receptors, complement, ...
اقرأ المزيد
This volume is covering many topics in control theory and several different applications. The variety of their research is ...
اقرأ المزيد