As individual needs have arisen in the fields of physics, electrical engineering and computational science, each has created ...
Lire la suiteThis open access book was prepared as a Final Publication of the COST Action IC1304 “Autonomous Control for a Reliable ...
Lire la suiteThis book constitutes the thoroughly refereed post-conference proceedings of the Second IFIP TC 2 Central and East Conference ...
Lire la suiteThis book constitutes the refereed conference proceedings of the 12th International Conference on Bio-inspired Information ...
Lire la suiteBotnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based ...
Lire la suiteThis book constitutes the refereed proceedings of the 2nd International Castle Meeting, ISMCTA 2008. The papers cover network ...
Lire la suiteAccessible introduction to the theoretical foundations of modern coding theoryIncluding numerous applications to wireless ...
Lire la suiteThis book expands a recent mathematical treatment of the Baars model of individual consciousness to an institutional venue ...
Lire la suiteThis volume examines the difficulties that arise in creating highly complex engineered systems and new approaches that are ...
Lire la suiteThis book, written by an international team of experts, introduces the reader to various aspects of complexity theory and ...
Lire la suiteThis volume contains 27 contributions to the Second Russian-German Advanced Research Workshop on Computational Science and ...
Lire la suiteThe concept of CAST, computer aided systems Theory, was introduced by F. Pichler of Linz in the late 1980s to include those ...
Lire la suiteThis book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...
Lire la suiteThis book brings together the fundamental ideas of information theory and the statistical mechanics of phase transitions ...
Lire la suiteMany communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access ...
Lire la suiteRSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...
Lire la suiteThis book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
Lire la suiteA rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
Lire la suiteThis book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...
Lire la suiteThis book is about public open spaces, about people, and about the relationship between them and the role of technology in ...
Lire la suite