This volume presents several case studies highlighting the latest findings in Industry 4.0 projects utilizing S-BPM features. ...
اقرأ المزيدThis is the first book to present field studies on the application of subject-oriented business process management (S-BPM). ...
اقرأ المزيدSAT-Based Scalable Formal Verification Solutions discusses in detail several of the latest and interesting scalable SAT-based ...
اقرأ المزيدThis volume contains the papers presented at the Tenth SDL Forum, Cop- hagen. SDL is the Speci?cation and Description Language ...
اقرأ المزيدThis book is segmented into four topical sections on foundations of computer science; computing by nature; networks, security, ...
اقرأ المزيدThis book series looks at each of the main coastal habitats - salt marshes, sand dunes and sand/shingle shores, modified ...
اقرأ المزيدThe book tackles the problems that must be addressed before sensors are deployed for surveillance, tracking, and other monitoring ...
اقرأ المزيدWelcome to the proceedings of the 5th International Conference on Scale-Space and PDE Methods in Computer Vision. The scale-space ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Third International Conference on Scale-Space and Morphology in Computer ...
اقرأ المزيدThis book is organized in topical sections on applied topic maps in industry and administration, visualisation and representation ...
اقرأ المزيدThis book presents the Scaling Management Framework, a model based on collected experiences from companies that have already ...
اقرأ المزيدThe book draws together a series of important case studies to provide a comprehensive review and synthesis of the most recent ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 5th Annual Smart City 360° Summit, held in Braga, Portugal, in December ...
اقرأ المزيدThis book details the mathematical fundamentals of the lifting transform and illustrates the latest applications of the transform ...
اقرأ المزيدThis book trains the next generation of scientists representing different disciplines to leverage the data generated during ...
اقرأ المزيدBiometrics is becoming increasingly common in establishments that require high security such as state security and financial ...
اقرأ المزيدThis book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN ...
اقرأ المزيدThis two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...
اقرأ المزيدThis two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...
اقرأ المزيدThis book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, ...
اقرأ المزيد