This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
Continue reading
In recent years, there has been significant interest and advances in developing systematic techniques to synthesize interactive ...
Continue reading
This book and its companion volumes constitute the Proceedings of the 13th - ternationalConferenceonNeuralInformationProcessing(ICONIP2006)heldin ...
Continue reading
The three volume set LNCS 4232, LNCS 4233, and LNCS 4234 constitutes the refereed proceedings of the 13th International Conference ...
Continue reading
This book and its companion volumes constitute the Proceedings of the 13th - ternationalConferenceonNeuralInformationProcessing(ICONIP2006)heldin ...
Continue reading
The 228 revised full papers presented were carefully reviewed and selected from numerous ordinary paper submissions and 15 ...
Continue reading
The 228 revised full papers presented were carefully reviewed and selected from numerous ordinary paper submissions and 15 ...
Continue reading
Nurture or nature? Biology or environment? Why are some people intelligent, or personable, or creative and others obtuse, ...
Continue reading
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue reading
This book examines new developments in the theory and practice of computation from a mathematical perspective, with topics ...
Continue reading
The book presents chapters by an interdisciplinary range of scholars who show new directions that often challenge the established ...
Continue reading
This book constitutes extended, revised and selected papers from the 11th International Symposium of Artificial Intelligence ...
Continue reading
The objectives of this book are to present the award papers of the 20th annual conference of JSAI 2006 and selected papers ...
Continue reading
The technology of artifcial intelligence is increasing its importance thanks to the rapid growth of the Internet and computer ...
Continue reading
This book provides introductory material about enterprise risk management, and the role of risk in decision making. It presents ...
Continue readingThe book is structured in four parts: Part I “The Big Data Opportunity” explores the value potential of big data with ...
Continue reading
The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
Continue reading
This book constitutes thoroughly refereed short papers of the 24th European Conference on Advances in Databases and Information ...
Continue reading
This book constitutes the refereed proceedings of the 8th International Conference on Next Generation Teletraffic and Wired/Wireless ...
Continue reading
Next Generation Transport Networks: Data, Management, and Control Planes provides a tutorial and reference information for ...
Continue reading