Intense global competition in manufacturing has compelled manufacturers to incorporate repetitive processing and automation ...
Continue reading
This work proposes to apply the Sliding Regimes (RG) algorithms to industrial regulation and servo loops controlled to date ...
Continue reading
Time-dependent scheduling involves problems in which the processing times of jobs depend on when those jobs are started. ...
Continue reading
Network flow optimization analyzes optimization problems on networks; hence, network optimization is reflected in many application ...
Continue reading
This is Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; ...
Continue reading
The book is organized in topical sections on parameterized systems, model checking, applications, static analysis, concurrent/distributed ...
Continue reading
Most topics dealt with here deal with complex analysis of both one and several complex variables. Several contributions come ...
Continue reading
This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Continue reading
This volume includes lecture notes devoted to the asymptotic analysis of such problems when the multi-scale behaviour derives ...
Continue reading
Topological bifurcation theory is one of the most essential topics in mathematics. This book contains original bifurcation ...
Continue reading
This book presents computational paradigms describing lower- and higher-level cognitive functions, including mechanisms of ...
Continue reading
Today’s mobile robot perception is insufficient for acting goal-directedly in unconstrained, dynamic everyday environments ...
Continue readingAt the beginning of the 21st century, manufacturing industry is faced with new challenges stemming from globalization and ...
Continue reading
This book contains four highly detailed papers. The first paper focuses on quantitative aspects of the bgl operon for E.coli. ...
Continue reading
The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
Continue reading
The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Continue reading
It contains teaching concurrency; process languages; process mining; software engineering; state space visualisation techniques; ...
Continue reading
This volume collects essays that broadly encompass the digital arts, Transdisciplinary Digital Art gives a clear overview ...
Continue reading
Based on case studies, this book illustrates the complex challenges faced by healthcare administrators when implementing ...
Continue reading
This book constitutes the thoroughly refereed proceedings of the 33rd International Conference on Industrial, Engineering ...
Continue reading