 
                This book cover theory, practice, applications, and experiences related to secure software.
Weiterlesen 
                This book cover theory, practice, applications, and experiences related to secure software.
Weiterlesen 
                This book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Weiterlesen 
                This book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Weiterlesen 
                This volume is the outcome of the first CASY workshop on "Advances in Control Theory and Applications" which was held at ...
Weiterlesen 
                Covers topics on both theoretical control systems and their applications across engineering domains such as automatic control, ...
Weiterlesen 
                Each year, the International Conference on Cooperative Control and Optimization (CCO) brings together top researchers from ...
Weiterlesen 
                This book constitutes the proceedings of the Industrial Conference on Data Mining ICDM-Leipzig was the fourth meeting in ...
Weiterlesen 
                Differential evolution is arguably one of the hottest topics in today's computational intelligence research. This book ...
Weiterlesen 
                Advances in Digital Forensics IV describes original research results and innovative applications in the emerging discipline ...
Weiterlesen 
                This book contains the papers presenting the latest developments in the areas of Electrical, Electronics, Communication systems ...
Weiterlesen 
                The papers presented in this book address diverse challenges in decarbonizing energy systems, ranging from operational to ...
Weiterlesen 
                The book addresses key issues of human-robot interaction concerned with perception, modelling, control, planning and cognition, ...
Weiterlesen 
                This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, ...
Weiterlesen 
                The three volume set LNCS 3496/3497/3498 constitutes the refereed proceedings of the Second International Symposium on Neural ...
Weiterlesen 
                This book and its sister volumes constitute the proceedings of the 2nd International Symposium on Neural Networks (ISNN 2005). ...
Weiterlesen 
                The three volume set LNCS 3496/3497/3498 constitutes the refereed proceedings of the Second International Symposium on Neural ...
Weiterlesen 
                This book presents a unique collection of practical examples from the field of pharma business management and research. ...
Weiterlesen 
                This volume provides a unique collection of papers written in honor of the 70th birthday of Suguru Arimoto who has long been ...
Weiterlesen 
                An up-to-date source for computation applications of optimization, prediction via artificial intelligence methods, and evaluation ...
Weiterlesen