These proceedings are the fifth in the series Traffic and Granular Flow, and we hope they will be as useful a reference as ...
Continue readingThe conference series Trafc and Granular Flow has been established in 1995 and has since then been held biannually. At that ...
Continue readingIn this book, the authors present a challenge for future research to build a stronger, more complete understanding of entrepreneurial ...
Continue readingThis study reviews the ways in which the owners and workers of IMEs have acquired the vocational and management skills that ...
Continue readingThis book is the French translation of a reference book Andrology for the clinicians. It has two parts. The first part is ...
Continue readingIn the last two decades of the 20th century, we obtained our first detailed look at a cometary nucleus and detected objects ...
Continue readingAll organizations, institutions, business processes, markets and strategies have one aim in common: the reduction of transaction ...
Continue readingThe SystemC consortium has published the official TLM development kit in May 2005 to standardize this modeling technique. ...
Continue readingTransactions on Computational Science II is devoted to the subject of denotational mathematics for computational intelligence. ...
Continue readingThis issue of the journal reports someContains contributions presented at the first Converging Science conference held at ...
Continue readingThis book contains four highly detailed papers. The first paper focuses on quantitative aspects of the bgl operon for E.coli. ...
Continue readingThis issue of Transactions on Computational Systems Biologycontains a selec-tion of papers presented initially at the 2005 ...
Continue readingThis issue of Transactions on Computational Systems Biology contains a fully-refereed selection of papers from the Fourth ...
Continue readingThis volume, the 7th in the Transactions on Computational Systems Biology series, contains a fully refereed and carefully ...
Continue readingThe first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
Continue readingThis inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
Continue readingThis second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
Continue readingThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Continue readingThis book subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, ...
Continue readingTransactions on HiPEAC is a new journal which aims at the timely dissemination of research contributions in computer architecture ...
Continue reading