Part I of this book presents a high-level description of an artificial agent which humans can freely communicate with in ...
Lire la suiteThis easy-to-follow text provides an accessible introduction to the key topics of formal languages and abstract machines ...
Lire la suiteThis book gives a comprehensive account of Maude, a language and system based on rewriting logic. Many examples are used ...
Lire la suiteThis book gives a comprehensive account of Maude, a language and system based on rewriting logic. Many examples are used ...
Lire la suiteThis volume, with forewords by Greg Bollella and Dana Scott, presents novel programs based on the new advances in this area, ...
Lire la suitePractical Introduction to PSL is primarily targeted to hardware designers and verification engineers who plan to use PSL. ...
Lire la suiteProbabilistic techniques are increasingly being employed in computer programs and systems because they can increase efficiency ...
Lire la suiteThis volume contains a collection of the papers presented during the 1st International ACM-L Workshop, which was held on ...
Lire la suiteThis book constitutes the thoroughly refereed post-workshop proceedings of the 5th International Workshop on Adaptive Multimedia ...
Lire la suiteThis book cover theory, practice, applications, and experiences related to secure software.
Lire la suiteThis book cover theory, practice, applications, and experiences related to secure software.
Lire la suiteThis book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Lire la suiteThis book Covering all current aspects of computer and network security, the papers are organized in topical sections on ...
Lire la suiteThis book constitutes the refereed joint proceedings of seven international workshops held in conjunction with the 25th International ...
Lire la suiteThis book Covering data warehouses, security, model transformation, state diagrams development and model quality.
Lire la suiteThis book Covering data warehouses, security, model transformation, state diagrams development and model quality.
Lire la suiteThis book constitutes the proceedings of the 25th European Conference on Advances in Databases and Information Systems, ADBIS ...
Lire la suiteThis book constitutes the refereed proceedings of the Third International Conference on Grid and Pervasive Computing, GPC ...
Lire la suiteThis book presented evaluation, recommendation, optimization, semantics, aggregation, queries, mining social media, digital ...
Lire la suiteThis book presented evaluation, recommendation, optimization, semantics, aggregation, queries, mining social media, digital ...
Lire la suite