Edited in collaboration with FoLLI, the Association of Logic, Language and Information, this book inaugurates the new FoLLI ...
Continue readingThis book constitutes the refereed proceedings of the 11th European Conference on Logics in Artificial Intelligence, JELIA ...
Continue readingThis book deals with the differential geometry of manifolds, loop spaces, line bundles and groupoids, and the relations of ...
Continue readingMalware Detection, based on the Special ARO/DHS Workshop on Malware Detection at Rosslyn, VA, in 2005, captures the state ...
Continue readingThe 23 articles in this volume encompass the proceedings of the International Conference on Modules and Comodules held in ...
Continue readingThis book is based on lectures given at a summer school held in Nordfjordeid on the Norwegian west coast in August 2002. ...
Continue readingThe technology of artifcial intelligence is increasing its importance thanks to the rapid growth of the Internet and computer ...
Continue readingThe goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
Continue readingCombines conceptual and procedural understanding for students and will guide you to master prerequisite skills to carry out ...
Continue readingThis book includes models based on Markov and semi-Markov processes, multi-state models, models and methods in lifetime data ...
Continue readingThis book includes models based on Markov and semi-Markov processes, multi-state models, models and methods in lifetime data ...
Continue readingThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Continue readingThe topics in the book include: - the representation of mathematical statements by formulas in a formal language. - the interpretation ...
Continue readingThis book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, ...
Continue readingThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Continue readingSustainability and procurement Sustainable sourcing Responsible sourcing Purchasing Category management Operating models ...
Continue readingWhile most of the current works in Artificial Intelligence (AI) focus on individual aspects of intelligence and cognition, ...
Continue readingThe self-contained theory of certain singular coverings of toposes called complete spreads, that is presented in this volume, ...
Continue readingThe objective was to imagine the landscape in which next generations of software-intensive systems will operate and the challenges ...
Continue readingA concise and accessible introduction to the science and applications of text analytics (or text mining), which enables automatic ...
Continue reading