Part I of this book presents a high-level description of an artificial agent which humans can freely communicate with in ...
Lire la suite
This easy-to-follow text provides an accessible introduction to the key topics of formal languages and abstract machines ...
Lire la suite
This book gives a comprehensive account of Maude, a language and system based on rewriting logic. Many examples are used ...
Lire la suite
This book gives a comprehensive account of Maude, a language and system based on rewriting logic. Many examples are used ...
Lire la suite
This volume, with forewords by Greg Bollella and Dana Scott, presents novel programs based on the new advances in this area, ...
Lire la suite
Practical Introduction to PSL is primarily targeted to hardware designers and verification engineers who plan to use PSL. ...
Lire la suite
Probabilistic techniques are increasingly being employed in computer programs and systems because they can increase efficiency ...
Lire la suite
This volume contains a collection of the papers presented during the 1st International ACM-L Workshop, which was held on ...
Lire la suite
This book constitutes the thoroughly refereed post-workshop proceedings of the 5th International Workshop on Adaptive Multimedia ...
Lire la suite
This book cover theory, practice, applications, and experiences related to secure software.
Lire la suite
This book cover theory, practice, applications, and experiences related to secure software.
Lire la suite
This book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Lire la suite
This book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Lire la suite
This book constitutes the refereed joint proceedings of seven international workshops held in conjunction with the 25th International ...
Lire la suite
This book Covering data warehouses, security, model transformation, state diagrams development and model quality.
Lire la suite
This book Covering data warehouses, security, model transformation, state diagrams development and model quality.
Lire la suite
This book constitutes the proceedings of the 25th European Conference on Advances in Databases and Information Systems, ADBIS ...
Lire la suite
This book constitutes the refereed proceedings of the Third International Conference on Grid and Pervasive Computing, GPC ...
Lire la suite
This book presented evaluation, recommendation, optimization, semantics, aggregation, queries, mining social media, digital ...
Lire la suite
This book presented evaluation, recommendation, optimization, semantics, aggregation, queries, mining social media, digital ...
Lire la suite