This book constitutes the refereed proceedings of the Fifth International Conference on Computational Science (ICCS 2005) ...
Lire la suiteThe two-volume set LNCS 5072 and 5073 constitutes the refereed proceedings of the International Conference on Computational ...
Lire la suiteThe two-volume set LNCS 5072 and 5073 constitutes the refereed proceedings of the International Conference on Computational ...
Lire la suiteThis biennial meeting focuses on the foundations, theory, models and applications of systems inspired by nature (neural networks, ...
Lire la suiteThis biennial meeting focuses on the foundations, theory, models and applications of systems inspired by nature (neural networks, ...
Lire la suiteThe two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer ...
Lire la suiteThe two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer ...
Lire la suiteThis volume presented automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical ...
Lire la suiteThis book constitutes the proceedings of the 23rd International Workshop on Computer Algebra in Scientific Computing, CASC ...
Lire la suiteComputer Applications in Sustainable Forest Management presents state-of-the-art computer applications in a variety of specialty ...
Lire la suiteThis book constitutes thoroughly refereed post-conference proceedings of the 8th Asian Symposium on Computer Mathematics, ...
Lire la suiteThis book constitutes the thoroughly refereed post-conference proceedings of the 4th International Computer Music Modeling ...
Lire la suiteAs society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...
Lire la suiteThis volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
Lire la suiteThis volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
Lire la suiteThis volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
Lire la suiteThe text works its way from theapplication layer down toward the physical layer, motivating students by exposing them to ...
Lire la suiteThe text works its way from the application layer down toward the physical layer, motivating students by exposing them to ...
Lire la suiteThis book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, ...
Lire la suiteThis book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...
Lire la suite