This book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...
Lire la suiteA study of Islamic architecture in Anatolia following the Mongol conquest in 1243. Complex shifts in rule, movements of population, ...
Lire la suiteReceding Horizon Control introduces the essentials of a successful feedback strategy that has emerged in many industrial ...
Lire la suiteThe purpose of the Workshop was to bring together researchers and en gineers working in adsorption related fields, to share ...
Lire la suiteThe purpose of the Workshop was to bring together researchers and en gineers working in adsorption related fields, to share ...
Lire la suiteTopics covered by the Workshop include recent theoretical and experi mental developments on environmental adsorption, adsorption ...
Lire la suiteThis book constitutes the thoroughly refereed and extended post-proceedings of the 11th Annual ERCIM International Workshop ...
Lire la suiteConstitutes the extended post-proceedings of the ERCIM/CoLogNet International Workshop on Constraint Satisfaction and Constraint ...
Lire la suitePrivacy in statistical databases is a discipline whose purpose is to provide - lutions to the con?ict between the increasing ...
Lire la suiteThis book address all aspects of constraint and logic programming, including foundational issues, implementation techniques, ...
Lire la suiteThis volume contains 22 peer reviewed papers from this year's conference that are organised into five sections: - Applications ...
Lire la suiteThis volume contains areas, mainly applications, which have not appeared in any collection of this type. The book representing ...
Lire la suiteHere are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. Papers cover ...
Lire la suiteThis book presents the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took ...
Lire la suiteThis book presents the proceed-ings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID2006), which took ...
Lire la suiteThis book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Lire la suiteThe theory of linear models and regression analysis plays an essential role in the development of methods for the statistical ...
Lire la suiteThis book expands the lectures given at IWOTA’05 (International Workshop on Operator Theory and Applications) which was ...
Lire la suite"Recent Advances in Memetic Algorithms" presents a rich state-of-the-art gallery of works on Memetic algorithms. Recent ...
Lire la suiteThis book contains a selection of papers presented at a Symposium organized under the aegis of COST Telecommunications Action ...
Lire la suite