This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference ...
Continue reading
This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference ...
Continue reading
This volume contains the proceedings of the International Conference on Computer Aided Veri?cation (CAV), held in Edinburgh, ...
Continue reading
This volume presented automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical ...
Continue reading
The volume cover logics, decision procedures; and solvers; numerical programs; verification; distributed systems and networks; ...
Continue reading
This book constitutes the proceedings of the 23rd International Workshop on Computer Algebra in Scientific Computing, CASC ...
Continue reading
Computer Applications in Sustainable Forest Management presents state-of-the-art computer applications in a variety of specialty ...
Continue reading
Computer Engineering in Applied Electromagnetism contains papers which were presented at the International Symposium on Electromagnetic ...
Continue reading
Security is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recent ...
Continue reading
This book constitutes thoroughly refereed post-conference proceedings of the 8th Asian Symposium on Computer Mathematics, ...
Continue reading
This volume contains the final proceedings for the 2004 Computer Music Model-ing and Retrieval Symposium (CMMR 2004). CMMR ...
Continue reading
This book constitutes the thoroughly refereed post-proceedings of the Third International Computer Music Modeling and Retrieval ...
Continue reading
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Computer Music Modeling ...
Continue reading
As society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...
Continue reading
This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
Continue reading
This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
Continue reading
This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
Continue reading
The text works its way from theapplication layer down toward the physical layer, motivating students by exposing them to ...
Continue reading
The text works its way from the application layer down toward the physical layer, motivating students by exposing them to ...
Continue reading
This book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, ...
Continue reading