This book constitutes the refereed proceedings of the Fifth International Conference on Computational Science (ICCS 2005) ...
Continue readingThe two-volume set LNCS 5072 and 5073 constitutes the refereed proceedings of the International Conference on Computational ...
Continue readingThe two-volume set LNCS 5072 and 5073 constitutes the refereed proceedings of the International Conference on Computational ...
Continue readingThis biennial meeting focuses on the foundations, theory, models and applications of systems inspired by nature (neural networks, ...
Continue readingThis biennial meeting focuses on the foundations, theory, models and applications of systems inspired by nature (neural networks, ...
Continue readingThe two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer ...
Continue readingThe two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer ...
Continue readingThis volume presented automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical ...
Continue readingThis book constitutes the proceedings of the 23rd International Workshop on Computer Algebra in Scientific Computing, CASC ...
Continue readingComputer Applications in Sustainable Forest Management presents state-of-the-art computer applications in a variety of specialty ...
Continue readingThis book constitutes thoroughly refereed post-conference proceedings of the 8th Asian Symposium on Computer Mathematics, ...
Continue readingThis book constitutes the thoroughly refereed post-conference proceedings of the 4th International Computer Music Modeling ...
Continue readingAs society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...
Continue readingThis volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
Continue readingThis volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
Continue readingThis volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
Continue readingThe text works its way from theapplication layer down toward the physical layer, motivating students by exposing them to ...
Continue readingThe text works its way from the application layer down toward the physical layer, motivating students by exposing them to ...
Continue readingThis book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, ...
Continue readingThis book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...
Continue reading