This book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...
Lee mas
                The present book is a festschrift in honor of Luigia Carlucci Aiello. The 18 articles included are written by former students, ...
Lee mas
                Despite the goal of performance improvement, results from mergers and acquisitions (M&A) are often disappointing. Numerous ...
Lee mas
                A study of Islamic architecture in Anatolia following the Mongol conquest in 1243. Complex shifts in rule, movements of population, ...
Lee mas
                Receding Horizon Control introduces the essentials of a successful feedback strategy that has emerged in many industrial ...
Lee mas
                Applied probability is a broad research area that is of interest to scientists in diverse disciplines in science and technology, ...
Lee mas
                Constitutes the extended post-proceedings of the ERCIM/CoLogNet International Workshop on Constraint Satisfaction and Constraint ...
Lee mas
                Privacy in statistical databases is a discipline whose purpose is to provide - lutions to the con?ict between the increasing ...
Lee mas
                This book address all aspects of constraint and logic programming, including foundational issues, implementation techniques, ...
Lee mas
                This volume contains 22 peer reviewed papers from this year's conference that are organised into five sections: - Applications ...
Lee mas
                This volume contains areas, mainly applications, which have not appeared in any collection of this type. The book representing ...
Lee mas
                This book presents the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took ...
Lee mas
                This book presents the proceed-ings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID2006), which took ...
Lee mas
                This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Lee mas
                The theory of linear models and regression analysis plays an essential role in the development of methods for the statistical ...
Lee mas
                This book expands the lectures given at IWOTA’05 (International Workshop on Operator Theory and Applications) which was ...
Lee mas
                "Recent Advances in Memetic Algorithms" presents a rich state-of-the-art gallery of works on Memetic algorithms. Recent ...
Lee mas
                This book contains a selection of papers presented at a Symposium organized under the aegis of COST Telecommunications Action ...
Lee mas
                Thisvolumecontainsaselectionofpapersinmodernoperatortheoryanditsapp- cations. Most of them are directly related to lectures ...
Lee mas
                The Romanian conferences in operator theory, as they are now commonly called, havestartedintheyear1976asanannualworkshoponoperatortheoryheldatthe ...
Lee mas