The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
Continue readingDiscusses the future possibilities of AI with cloud computing and edge computing. Aims to conduct analyses, implementation ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue readingDiscusses the evolution of future generation technologies through Internet of Things (IoT) in the scope of Artificial Intelligence ...
Continue readingWireless communication and networking based on AI concepts and techniques are explored in this book, specifically focusing ...
Continue readingThis book constitutes the refereed proceedings of the 9th IAPR TC3 International Workshop on Artificial Neural Networks in ...
Continue readingWhere fishing livelihoods come from and where they are going are simple questions with no simple answers. Using examples ...
Continue readingThis book investigates the origins and evolution of Asia’s new institutional architecture in trade, finance, and security ...
Continue readingContaminated sediments pose some of the most difficult site remediation issues. Contaminated sediments typically reside in ...
Continue readingProceedings of the NATO Advanced Research Workshop on Assessment of Hydrogen Energy for Sustainable Development: Energy & ...
Continue readingLike all limited and vulnerable resources, water has become one of the potential targets of terrorists. Coastal lagoons are ...
Continue readingThe book includes a legal overview of European asylum determination procedures, followed by sections on the diverse actors ...
Continue readingThis collection of peer reviewed papers represents a concise, up-to-date summary of our current knowledge of planetary boundary ...
Continue readingAtmospheric ice takes a wide range of fascinating forms, all beautiful in their own ways but many posing severe risk to the ...
Continue readingAuthentication system has become a hot topic in the field of security, one of the most interested methods of authentication ...
Continue readingThis volume presented three major tracks covering algorithms, automata, complexity, and games
Continue readingThis volume presented three major tracks covering algorithms, automata, complexity, and games
Continue readingICALP is a series of annual conferences of the European Association for Theoretical Computer Science (EATCS) which frsttookplacein1972 ...
Continue readinga series of annual conferences of the European Association for Theoretical Computer Science (EATCS) which frsttookplacein ...
Continue readingThe Second IFIP Workshop on Autonomic Communication (WAC 2005) took place on October 2–5, 2005, IFIP TC6 provided scientific ...
Continue reading