A study of Islamic architecture in Anatolia following the Mongol conquest in 1243. Complex shifts in rule, movements of population, ...
Continue reading
The purpose of the Workshop was to bring together researchers and en gineers working in adsorption related fields, to share ...
Continue reading
The purpose of the Workshop was to bring together researchers and en gineers working in adsorption related fields, to share ...
Continue reading
Topics covered by the Workshop include recent theoretical and experi mental developments on environmental adsorption, adsorption ...
Continue reading
This book constitutes the thoroughly refereed and extended post-proceedings of the 11th Annual ERCIM International Workshop ...
Continue reading
Constitutes the extended post-proceedings of the ERCIM/CoLogNet International Workshop on Constraint Satisfaction and Constraint ...
Continue reading
Privacy in statistical databases is a discipline whose purpose is to provide - lutions to the con?ict between the increasing ...
Continue reading
This book address all aspects of constraint and logic programming, including foundational issues, implementation techniques, ...
Continue reading
This volume contains 22 peer reviewed papers from this year's conference that are organised into five sections: - Applications ...
Continue reading
The application of metaheuristics to combinatorial optimisation is an active field in which new theoretical developments, ...
Continue reading
This volume contains areas, mainly applications, which have not appeared in any collection of this type. The book representing ...
Continue reading
Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. Papers cover ...
Continue reading
This book presents the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took ...
Continue reading
This book presents the proceed-ings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID2006), which took ...
Continue reading
This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Continue reading
The theory of linear models and regression analysis plays an essential role in the development of methods for the statistical ...
Continue reading
"Recent Advances in Memetic Algorithms" presents a rich state-of-the-art gallery of works on Memetic algorithms. Recent ...
Continue reading
This book contains a selection of papers presented at a Symposium organized under the aegis of COST Telecommunications Action ...
Continue reading
Thisvolumecontainsaselectionofpapersinmodernoperatortheoryanditsapp- cations. Most of them are directly related to lectures ...
Continue reading
This volume contains the Proceedings of the Twelfth French-German-Spanish Conference on Optimization held at the University ...
Continue reading