This volume presents several case studies highlighting the latest findings in Industry 4.0 projects utilizing S-BPM features. ...
WeiterlesenThis is the first book to present field studies on the application of subject-oriented business process management (S-BPM). ...
WeiterlesenSAT-Based Scalable Formal Verification Solutions discusses in detail several of the latest and interesting scalable SAT-based ...
WeiterlesenThis volume contains the papers presented at the Tenth SDL Forum, Cop- hagen. SDL is the Speci?cation and Description Language ...
WeiterlesenThis book is segmented into four topical sections on foundations of computer science; computing by nature; networks, security, ...
WeiterlesenThis book series looks at each of the main coastal habitats - salt marshes, sand dunes and sand/shingle shores, modified ...
WeiterlesenThe book tackles the problems that must be addressed before sensors are deployed for surveillance, tracking, and other monitoring ...
WeiterlesenWelcome to the proceedings of the 5th International Conference on Scale-Space and PDE Methods in Computer Vision. The scale-space ...
WeiterlesenThis book constitutes the refereed proceedings of the Third International Conference on Scale-Space and Morphology in Computer ...
WeiterlesenThis book is organized in topical sections on applied topic maps in industry and administration, visualisation and representation ...
WeiterlesenThis book presents the Scaling Management Framework, a model based on collected experiences from companies that have already ...
WeiterlesenThe book draws together a series of important case studies to provide a comprehensive review and synthesis of the most recent ...
WeiterlesenThis book constitutes the refereed proceedings of the 5th Annual Smart City 360° Summit, held in Braga, Portugal, in December ...
WeiterlesenThis book details the mathematical fundamentals of the lifting transform and illustrates the latest applications of the transform ...
WeiterlesenThis book trains the next generation of scientists representing different disciplines to leverage the data generated during ...
WeiterlesenBiometrics is becoming increasingly common in establishments that require high security such as state security and financial ...
WeiterlesenThis book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN ...
WeiterlesenThis two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...
WeiterlesenThis two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...
WeiterlesenThis book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, ...
Weiterlesen