The 27 revised full papers presented here, together with one invited paper were carefully reviewed and selected from 58 submissions. ...
Lire la suiteThis volume contains the papers accepted for presentation at the 7th Interna-tional Conference on Verification, Model Checking, ...
Lire la suiteThe book includes a general introduction to the area, which also presents the vision of a grand challenge project: the "verifying ...
Lire la suiteMultimedia networking applications and, in particular, the transport of c- pressed video are expected to contribute signi?cantly ...
Lire la suiteHacking Detection using AI is a hot research topic. There are two types of Intrusion Detection Systems (IDS), Network IDS(NIDS) ...
Lire la suiteImage analysis is a computational feat which humans show excellence in, in comp- ison with computers. Yet the list of applications ...
Lire la suiteThis book explores the use of visual methods in migration studies through a combination of theoretical analyses and empirical ...
Lire la suiteThis book takes steps towards the realization of domestic robots by presenting an integrated systems view of computer vision ...
Lire la suiteVolcanic unrest is a complex multi-hazard phenomenon. The fact that unrest may, or may not lead to an imminent eruption contributes ...
Lire la suiteThis statement in the most recent Human Development Report articulates a conv- tion that has increasingly gained ground in ...
Lire la suitePresents the basic concepts and applications of water and wastewater engineering technology. It is primarily designed for ...
Lire la suiteThis is the first book that looks at Web engineering from a measurement perspective. The result is a self-containing, comprehensive ...
Lire la suitethe book include: workshop was the first in the field to focus on the interplay between (a) intelligent technologies, especially ...
Lire la suiteThis volume contains the proceedings ofthe international workshop WS-FM(Web Services and Formal Methods) held at Vienna University ...
Lire la suiteThis book address the application of formal methods and reasoning techniques to Web service technology, and formal theories ...
Lire la suiteThe largest retail branch bank network is built in one of the most formidable environments in the world. This book takes ...
Lire la suiteThe book answers a simple question: when managers and companies face a decision with two outcomes that are safe and risky, ...
Lire la suiteThis book offers the first overview of the ‘wicked problems’ literature, often seen as complex, open-ended, and intractable, ...
Lire la suiteThis work covers two bases, both performance optimization strategies and a complete introduction to mathematical procedures ...
Lire la suiteThis book address current research and development efforts of various issues in the area of algorithms, systems and applications ...
Lire la suite