This is Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; ...
WeiterlesenThis year it comprised ?ve conferences (CC, ESOP, FASE, FOSSACS, TACAS), 17 satellite workshops (AVIS, BYTECODE, CEES, CLASE, ...
WeiterlesenThis book constitutes the refereed proceedings of the 12th International Conference on Tools and Algorithms for the Construction ...
WeiterlesenThe book is organized in topical sections on parameterized systems, model checking, applications, static analysis, concurrent/distributed ...
WeiterlesenIn this book, an international team of highly qualified experts treats important topics in acoustic echo and noise control ...
WeiterlesenThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
WeiterlesenLeading experts have contributed survey and research papers in the areas of Algebraic Combinatorics, Combinatorial Number ...
WeiterlesenThis is a nicely edited volume on Estimation of Distribution Algorithms (EDAs) by leading researchers on this important topic.
WeiterlesenThis research monograph proposes a unified, cross-fertilizing approach for knowledge-representation and modeling based on ...
WeiterlesenThis book begins by providing appropriate background information and then follows with an in-depth study of a few key issues ...
Weiterlesen(Publisher-supplied data) The LNCS journal Transactions on Computational Systems Biology is devoted to inter- and multidisciplinary ...
WeiterlesenThis book contains four highly detailed papers. The first paper focuses on quantitative aspects of the bgl operon for E.coli. ...
WeiterlesenThis issue of Transactions on Computational Systems Biologycontains a selec-tion of papers presented initially at the 2005 ...
WeiterlesenThis issue of Transactions on Computational Systems Biology contains a fully-refereed selection of papers from the Fourth ...
WeiterlesenThis volume, the 7th in the Transactions on Computational Systems Biology series, contains a fully refereed and carefully ...
WeiterlesenThe first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
WeiterlesenThis inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
WeiterlesenThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
WeiterlesenTransactions on HiPEAC is a new journal which aims at the timely dissemination of research contributions in computer architecture ...
WeiterlesenIt contains teaching concurrency; process languages; process mining; software engineering; state space visualisation techniques; ...
Weiterlesen