 
                This book cover theory, practice, applications, and experiences related to secure software.
Continue reading 
                This book cover theory, practice, applications, and experiences related to secure software.
Continue reading 
                This book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Continue reading 
                This book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Continue reading 
                This volume is the outcome of the first CASY workshop on "Advances in Control Theory and Applications" which was held at ...
Continue reading 
                Covers topics on both theoretical control systems and their applications across engineering domains such as automatic control, ...
Continue reading 
                Each year, the International Conference on Cooperative Control and Optimization (CCO) brings together top researchers from ...
Continue reading 
                This book constitutes the proceedings of the Industrial Conference on Data Mining ICDM-Leipzig was the fourth meeting in ...
Continue reading 
                Differential evolution is arguably one of the hottest topics in today's computational intelligence research. This book ...
Continue reading 
                Advances in Digital Forensics IV describes original research results and innovative applications in the emerging discipline ...
Continue reading 
                This book contains the papers presenting the latest developments in the areas of Electrical, Electronics, Communication systems ...
Continue reading 
                The papers presented in this book address diverse challenges in decarbonizing energy systems, ranging from operational to ...
Continue reading 
                The book addresses key issues of human-robot interaction concerned with perception, modelling, control, planning and cognition, ...
Continue reading 
                This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, ...
Continue reading 
                The three volume set LNCS 3496/3497/3498 constitutes the refereed proceedings of the Second International Symposium on Neural ...
Continue reading 
                This book and its sister volumes constitute the proceedings of the 2nd International Symposium on Neural Networks (ISNN 2005). ...
Continue reading 
                The three volume set LNCS 3496/3497/3498 constitutes the refereed proceedings of the Second International Symposium on Neural ...
Continue reading 
                This book presents a unique collection of practical examples from the field of pharma business management and research. ...
Continue reading 
                This volume provides a unique collection of papers written in honor of the 70th birthday of Suguru Arimoto who has long been ...
Continue reading 
                An up-to-date source for computation applications of optimization, prediction via artificial intelligence methods, and evaluation ...
Continue reading