This two volume set LNCS 5163 and LNCS 5164 constitutes the refereed proceedings of the 18th International Conference on ...
WeiterlesenThis two volume set LNCS 5163 and LNCS 5164 constitutes the refereed proceedings of the 18th International Conference on ...
WeiterlesenThis book constitutes the refereed proceedings of the 9th IAPR TC3 International Workshop on Artificial Neural Networks in ...
WeiterlesenThis book contains learning theory, advances in neural network learning methods, ensemble learning, spiking neural networks, ...
WeiterlesenThis book contains learning theory, advances in neural network learning methods, ensemble learning, spiking neural networks, ...
WeiterlesenThe two volume set LNCS 3696 and LNCS 3697 constitutes the refereed proceedings of the 15th International Conference on Artificial ...
WeiterlesenThe second volume contains 162 contributions related to Formal Models and their Applications and deals with new neural network ...
WeiterlesenAs AI becomes a giant trend in the business world, mobile apps are one of the usage areas, which people can benefit from. ...
WeiterlesenThis book contains modeling, simulation, and their applications.It also contains e-business, supply chain management, general ...
WeiterlesenThis book contains modeling, simulation, and their applications.It also contains e-business, supply chain management, general ...
WeiterlesenThe theme reflects upon the growth of the digital libraries community and explores new areas that the community could delve ...
WeiterlesenThe theme reflects upon the growth of the digital libraries community and explores new areas that the community could delve ...
WeiterlesenEfficient assembly line design is a problem of considerable industrial importance. Assembly Line Design will be bought by ...
WeiterlesenWith information and scale as central themes, this comprehensive survey explains how to handle real problems in astronomical ...
WeiterlesenProvides a step-by-step, visual guide to the most common procedures in emergency medicine. Completely revised, it also includes ...
WeiterlesenAuthentication system has become a hot topic in the field of security, one of the most interested methods of authentication ...
Weiterlesen"Auralization" is the technique of creation and reproduction of sound on the basis of computer data. With this tool is ...
WeiterlesenThis volume presented three major tracks covering algorithms, automata, complexity, and games
WeiterlesenThis volume presented three major tracks covering algorithms, automata, complexity, and games
WeiterlesenThis book constitutes the refereed proceedings of 32nd International Colloquium on Automata, Languages and Programming ICALP ...
Weiterlesen