This carefully edited book presents how natural groupings such as fish schools, bird flocks, deer herds etc. coordinate themselves ...
Continue readingIn today’s world of ubiquitously connected heterogeneous information systems and computing devices, the intelligent coordination ...
Continue readingIn today’s world of ubiquitously connected heterogeneous information systems and computing devices, the intelligent coordination ...
Continue readingThis book provides an insight in the basic understanding of cooperative systems as well as in theory, modeling, and applications ...
Continue readingChallenges arise when the size of a group of cooperating agents is scaled to hundreds or thousands of members. In domains ...
Continue readingThis volume aims to describe a variety of techniques that reflects the wide range of research currently performed in the ...
Continue readingAims to describe a variety of techniques that reflects the wide range of research currently performed in the field of coronavirology, ...
Continue readingProvides an extensive overview of the most recent technological advancements in facial plastic and reconstructive surgeries ...
Continue readingBuild and program MINDSTORM NXT robots with Daniele Benedettelli, one of the world's most respected NXT robot builders. ...
Continue readingHow do scientists use analogies and other processes to break away from old theories and generate new ones? This book documents ...
Continue readingPrevention and preparedness are the two basic approaches to maximize food security against any sort of tampering, whether ...
Continue readingFocuses on methods and techniques for crowd simulation, filling the gap in the professional literature. This survey covers ...
Continue readingThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
Continue readingThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
Continue readingThis book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
Continue readingA rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
Continue readingThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
Continue readingThis book constitutes the thoroughly refered post-proceedings of the 11th Conference of the Spanish Association for Artificial ...
Continue readingThis volume represents a collection of topics on natural killer cells, mast cells, phagocytes, toll like receptors, complement, ...
Continue readingThis volume is covering many topics in control theory and several different applications. The variety of their research is ...
Continue reading