Random matrices are widely and successfully used in physics for almost 60-70 years, beginning with the works of Dyson and ...
WeiterlesenSimulation methods are revolutionizing the practice of applied economic analysis. This volume collects eighteen chapters ...
WeiterlesenThis book provides detailed insights into recent works dealing with a large spectrum of issues in system-on-chip design, ...
WeiterlesenThis volume contains a broad specturm of both research and applications in both supply chain management and e-business. Several ...
WeiterlesenThis book provides an update of the latest research in control of time delay systems and applications by world leading experts. ...
WeiterlesenQuesto testo contiene una raccolta di esercizi riferiti agli argomenti tipici di un corso di metodi analitici e numerici ...
WeiterlesenAmong the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic ...
WeiterlesenAmong the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic ...
WeiterlesenThis book constitutes the refereed proceedings of the 16th International Symposium on Applied Algebra, Algebraic Algorithms ...
WeiterlesenIn Biotechnology for Fuels and Chemicals: The Twenty-Eighth Symposium, leading US and international researchers from academia, ...
WeiterlesenIn this book, anyone who can operate a PC, standard software and the Internet will learn to understand the biological basis ...
WeiterlesenAuthored by a pioneer of the field, this overview of charged particle optics provides a solid introduction to the field for ...
WeiterlesenPovides readers with the tools needed to determine the probability of failure, and when multiplied by the consequences of ...
Weiterlesenthis book provides the average person working in the materials field with a more balanced perspective of the role that computational ...
WeiterlesenThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
WeiterlesenThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
WeiterlesenThe two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography ...
WeiterlesenThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
WeiterlesenThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
WeiterlesenThe 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ...
Weiterlesen