This book is the outcome of a discussion meeting of leading scholars and critical thinkers with expertise in complex systems ...
اقرأ المزيد
This book reports on methods and technologies to describe, evaluate and control uncertainty in mechanical engineering applications. ...
اقرأ المزيد
The Fourth International Conference on Unconventional Computation, UC 2005, organized under the auspices of EATCS by the ...
اقرأ المزيد
This book about The 5th International Conference on Unconventional Computation, UC 2006,organized under the auspices of the ...
اقرأ المزيد
The book is devoted to all aspects of unconventional computation ranging from theoretical and experimental aspects to various ...
اقرأ المزيد
Action planning has always played a central role in Artificial Intelligence. Given a description of the current situation, ...
اقرأ المزيد
In June of 2002, over 500 professors, students and researchers met in Boston, Massachusetts for the Fourth International ...
اقرأ المزيد
This volume contains selected transcripts from presentations given at the conference. Speakers include: Chris Adami, Kenneth ...
اقرأ المزيد
There is a difference in the communication and safeguarding effects of a regulation, depending on the precision of its wording. ...
اقرأ المزيد
Urban Transport Development is a contribution to the ongoing global discussion on the future of urban transport. The main ...
اقرأ المزيد
Each of the 18 lessons introduces new programming objects, concepts or techniques that can be presented in a whole-group ...
اقرأ المزيد
This monograph, a revised version of the author's habilitation thesis, focusses on optimal flow analysis of sequential and ...
اقرأ المزيد
Automobiles are responsible for a substantial part of the world's consumption of primary energy, mostly fossil liquid hydrocarbons. ...
اقرأ المزيد
This volume brings together the invited papers and selected participants’ contributions presented at the COST 2102 International ...
اقرأ المزيد
The 27 revised full papers presented here, together with one invited paper were carefully reviewed and selected from 58 submissions. ...
اقرأ المزيد
This volume contains the papers accepted for presentation at the 7th Interna-tional Conference on Verification, Model Checking, ...
اقرأ المزيد
This book begins with consideration of possible frameworks for understanding virtuality and virtualization. It examines group ...
اقرأ المزيد
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
اقرأ المزيد
This book features original research in the areas of algorithms and data structures, combinatorial algorithms, graph drawings ...
اقرأ المزيدThis book gives an overview of possible solutions and helps to make the right choice. It presents the background, potentials ...
اقرأ المزيد