This book constitutes the thoroughly refereed post-conference proceedings of the Third International Symposium on Applications ...
اقرأ المزيد
MS is continuously developing as one of the most re- able analytical method for elucidating the structure of molecules originating ...
اقرأ المزيد
Membrane computing is a branch of natural computing which investigates computing models abstracted from the structure and ...
اقرأ المزيد
Random matrices are widely and successfully used in physics for almost 60-70 years, beginning with the works of Dyson and ...
اقرأ المزيد
This volume contains a broad specturm of both research and applications in both supply chain management and e-business. Several ...
اقرأ المزيد
Questo testo contiene una raccolta di esercizi riferiti agli argomenti tipici di un corso di metodi analitici e numerici ...
اقرأ المزيد
In Biotechnology for Fuels and Chemicals: The Twenty-Eighth Symposium, leading US and international researchers from academia, ...
اقرأ المزيد
In this book, anyone who can operate a PC, standard software and the Internet will learn to understand the biological basis ...
اقرأ المزيد
Authored by a pioneer of the field, this overview of charged particle optics provides a solid introduction to the field for ...
اقرأ المزيد
Povides readers with the tools needed to determine the probability of failure, and when multiplied by the consequences of ...
اقرأ المزيد
this book provides the average person working in the materials field with a more balanced perspective of the role that computational ...
اقرأ المزيد
The book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
اقرأ المزيد
The book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
اقرأ المزيد
The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography ...
اقرأ المزيد
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
اقرأ المزيد
The 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ...
اقرأ المزيد
Focuses on the fundamental concepts and at the same time on practical aspects of implementing neural networks and deep learning ...
اقرأ المزيد
The work contains chapters on several major topical areas that are central to applied demography including works on data ...
اقرأ المزيد
Applied Fuzzy Arithmetic provides a well-structured compendium that offers both a deeper knowledge about the theory of fuzzy ...
اقرأ المزيد