This volume presents several case studies highlighting the latest findings in Industry 4.0 projects utilizing S-BPM features. ...
Continue readingThis is the first book to present field studies on the application of subject-oriented business process management (S-BPM). ...
Continue reading
SAT-Based Scalable Formal Verification Solutions discusses in detail several of the latest and interesting scalable SAT-based ...
Continue reading
This volume contains the papers presented at the Tenth SDL Forum, Cop- hagen. SDL is the Speci?cation and Description Language ...
Continue reading
This book is segmented into four topical sections on foundations of computer science; computing by nature; networks, security, ...
Continue reading
This book series looks at each of the main coastal habitats - salt marshes, sand dunes and sand/shingle shores, modified ...
Continue reading
The book tackles the problems that must be addressed before sensors are deployed for surveillance, tracking, and other monitoring ...
Continue reading
Welcome to the proceedings of the 5th International Conference on Scale-Space and PDE Methods in Computer Vision. The scale-space ...
Continue reading
This book constitutes the refereed proceedings of the Third International Conference on Scale-Space and Morphology in Computer ...
Continue reading
This book is organized in topical sections on applied topic maps in industry and administration, visualisation and representation ...
Continue reading
This book presents the Scaling Management Framework, a model based on collected experiences from companies that have already ...
Continue reading
The book draws together a series of important case studies to provide a comprehensive review and synthesis of the most recent ...
Continue reading
This book constitutes the refereed proceedings of the 5th Annual Smart City 360° Summit, held in Braga, Portugal, in December ...
Continue reading
This book details the mathematical fundamentals of the lifting transform and illustrates the latest applications of the transform ...
Continue readingThis book trains the next generation of scientists representing different disciplines to leverage the data generated during ...
Continue reading
Biometrics is becoming increasingly common in establishments that require high security such as state security and financial ...
Continue reading
This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN ...
Continue reading
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...
Continue reading
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...
Continue reading
This book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, ...
Continue reading