Edited in collaboration with FoLLI, the Association of Logic, Language and Information, this book inaugurates the new FoLLI ...
Lire la suiteThis book constitutes the refereed proceedings of the 11th European Conference on Logics in Artificial Intelligence, JELIA ...
Lire la suiteThis book deals with the differential geometry of manifolds, loop spaces, line bundles and groupoids, and the relations of ...
Lire la suiteMalware Detection, based on the Special ARO/DHS Workshop on Malware Detection at Rosslyn, VA, in 2005, captures the state ...
Lire la suiteThe 23 articles in this volume encompass the proceedings of the International Conference on Modules and Comodules held in ...
Lire la suiteThis book is based on lectures given at a summer school held in Nordfjordeid on the Norwegian west coast in August 2002. ...
Lire la suiteThe technology of artifcial intelligence is increasing its importance thanks to the rapid growth of the Internet and computer ...
Lire la suiteThe goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
Lire la suiteCombines conceptual and procedural understanding for students and will guide you to master prerequisite skills to carry out ...
Lire la suiteThis book includes models based on Markov and semi-Markov processes, multi-state models, models and methods in lifetime data ...
Lire la suiteThis book includes models based on Markov and semi-Markov processes, multi-state models, models and methods in lifetime data ...
Lire la suiteThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Lire la suiteThe topics in the book include: - the representation of mathematical statements by formulas in a formal language. - the interpretation ...
Lire la suiteThis book constitutes the refereed proceedings of the First International Conference on Provable Security, ProvSec 2007, ...
Lire la suiteThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Lire la suiteSustainability and procurement Sustainable sourcing Responsible sourcing Purchasing Category management Operating models ...
Lire la suiteWhile most of the current works in Artificial Intelligence (AI) focus on individual aspects of intelligence and cognition, ...
Lire la suiteThe self-contained theory of certain singular coverings of toposes called complete spreads, that is presented in this volume, ...
Lire la suiteThe objective was to imagine the landscape in which next generations of software-intensive systems will operate and the challenges ...
Lire la suiteA concise and accessible introduction to the science and applications of text analytics (or text mining), which enables automatic ...
Lire la suite