This book constitutes the thoroughly refereed post-conference proceedings of the Kyoto Conference on Computational Geometry ...
Continue readingIt covers bio-inspired computing, evolutionary computation, learning systems and multi-agents, cryptography, information ...
Continue readingIt covers bio-inspired computing, evolutionary computation, learning systems and multi-agents, cryptography, information ...
Continue readingThis book constitutes the refereed proceedings of the Third International Computer Science Symposium in Russia, CSR 2008, ...
Continue readingContains sections on shape and texture, fitting, calbration, detection, image and video processing, applications, face and ...
Continue readingContains sections on shape and texture, fitting, calbration, detection, image and video processing, applications, face and ...
Continue readingThis book constitutes the refereed proceedings of the 6th International Conference on Computers and Games, CG 2008, held ...
Continue readingThe refereed proceedings of the 14th Annual International Computing and Combinatorics Conference, COCOON 2008, held in Dalian, ...
Continue readingThis book constitutes the refereed proceedings of the 16th International Conference on Conceptual Structures, ICCS 2008, ...
Continue readingThe volume consists of seven sections, six of which are dedicated to the main research areas to which Ugo Montanari has contributed: ...
Continue readingThe Constraint Handling Rules (CHR) language is a declarative concurrent committed-choice constraint logic programming language ...
Continue readingThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
Continue readingThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
Continue readingThis book constitutes the thoroughly refereed postproceedings of the 13th International Meeting on DNA Computing, DNA 13, ...
Continue readingThis volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...
Continue readingRandomness is a powerful phenomenon that can be harnessed to solve various problems in all areas of computer science. Randomized ...
Continue readingThis book showcases the state of the art in evolutionary algorithms for design. The chapters are organized by experts in ...
Continue readingThis book constitutes the refereed proceedings of the 12th International Conference on Developments in Language Theory, DLT ...
Continue readingThis book gives a broad overview of techniques used in the design of WDM networks for efficient dissemination of information ...
Continue readingThis book constitutes the refereed proceedings of the 22nd International Symposium on Distributed Computing, DISC 2008, held ...
Continue reading