This carefully edited book presents how natural groupings such as fish schools, bird flocks, deer herds etc. coordinate themselves ...
اقرأ المزيدIn today’s world of ubiquitously connected heterogeneous information systems and computing devices, the intelligent coordination ...
اقرأ المزيدIn today’s world of ubiquitously connected heterogeneous information systems and computing devices, the intelligent coordination ...
اقرأ المزيدThis book provides an insight in the basic understanding of cooperative systems as well as in theory, modeling, and applications ...
اقرأ المزيدChallenges arise when the size of a group of cooperating agents is scaled to hundreds or thousands of members. In domains ...
اقرأ المزيدThis volume aims to describe a variety of techniques that reflects the wide range of research currently performed in the ...
اقرأ المزيدAims to describe a variety of techniques that reflects the wide range of research currently performed in the field of coronavirology, ...
اقرأ المزيدProvides an extensive overview of the most recent technological advancements in facial plastic and reconstructive surgeries ...
اقرأ المزيدBuild and program MINDSTORM NXT robots with Daniele Benedettelli, one of the world's most respected NXT robot builders. ...
اقرأ المزيدHow do scientists use analogies and other processes to break away from old theories and generate new ones? This book documents ...
اقرأ المزيدPrevention and preparedness are the two basic approaches to maximize food security against any sort of tampering, whether ...
اقرأ المزيدFocuses on methods and techniques for crowd simulation, filling the gap in the professional literature. This survey covers ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
اقرأ المزيدThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
اقرأ المزيدThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
اقرأ المزيدA rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيدThis book constitutes the thoroughly refered post-proceedings of the 11th Conference of the Spanish Association for Artificial ...
اقرأ المزيدThis volume represents a collection of topics on natural killer cells, mast cells, phagocytes, toll like receptors, complement, ...
اقرأ المزيدThis volume is covering many topics in control theory and several different applications. The variety of their research is ...
اقرأ المزيد