Intense global competition in manufacturing has compelled manufacturers to incorporate repetitive processing and automation ...
Continue readingThis work proposes to apply the Sliding Regimes (RG) algorithms to industrial regulation and servo loops controlled to date ...
Continue readingTime-dependent scheduling involves problems in which the processing times of jobs depend on when those jobs are started. ...
Continue readingNetwork flow optimization analyzes optimization problems on networks; hence, network optimization is reflected in many application ...
Continue readingThis is Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; ...
Continue readingThe book is organized in topical sections on parameterized systems, model checking, applications, static analysis, concurrent/distributed ...
Continue readingMost topics dealt with here deal with complex analysis of both one and several complex variables. Several contributions come ...
Continue readingThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Continue readingThis volume includes lecture notes devoted to the asymptotic analysis of such problems when the multi-scale behaviour derives ...
Continue readingTopological bifurcation theory is one of the most essential topics in mathematics. This book contains original bifurcation ...
Continue readingThis book presents computational paradigms describing lower- and higher-level cognitive functions, including mechanisms of ...
Continue readingToday’s mobile robot perception is insufficient for acting goal-directedly in unconstrained, dynamic everyday environments ...
Continue readingAt the beginning of the 21st century, manufacturing industry is faced with new challenges stemming from globalization and ...
Continue readingThis book contains four highly detailed papers. The first paper focuses on quantitative aspects of the bgl operon for E.coli. ...
Continue readingThe first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
Continue readingThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Continue readingIt contains teaching concurrency; process languages; process mining; software engineering; state space visualisation techniques; ...
Continue readingThis volume collects essays that broadly encompass the digital arts, Transdisciplinary Digital Art gives a clear overview ...
Continue readingBased on case studies, this book illustrates the complex challenges faced by healthcare administrators when implementing ...
Continue readingThis book constitutes the thoroughly refereed proceedings of the 33rd International Conference on Industrial, Engineering ...
Continue reading