This book constitutes the refereed proceedings of the Fifth International Conference on Computational Science (ICCS 2005) ...
اقرأ المزيد
The two-volume set LNCS 5072 and 5073 constitutes the refereed proceedings of the International Conference on Computational ...
اقرأ المزيد
The two-volume set LNCS 5072 and 5073 constitutes the refereed proceedings of the International Conference on Computational ...
اقرأ المزيد
This biennial meeting focuses on the foundations, theory, models and applications of systems inspired by nature (neural networks, ...
اقرأ المزيد
This biennial meeting focuses on the foundations, theory, models and applications of systems inspired by nature (neural networks, ...
اقرأ المزيد
The two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer ...
اقرأ المزيد
The two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer ...
اقرأ المزيد
This volume presented automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical ...
اقرأ المزيد
This book constitutes the proceedings of the 23rd International Workshop on Computer Algebra in Scientific Computing, CASC ...
اقرأ المزيد
Computer Applications in Sustainable Forest Management presents state-of-the-art computer applications in a variety of specialty ...
اقرأ المزيد
This book constitutes thoroughly refereed post-conference proceedings of the 8th Asian Symposium on Computer Mathematics, ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Computer Music Modeling ...
اقرأ المزيد
As society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...
اقرأ المزيد
This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
اقرأ المزيد
This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
اقرأ المزيد
This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
اقرأ المزيد
The text works its way from theapplication layer down toward the physical layer, motivating students by exposing them to ...
اقرأ المزيد
The text works its way from the application layer down toward the physical layer, motivating students by exposing them to ...
اقرأ المزيد
This book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...
اقرأ المزيد