Decoupling or non-interactive control has attracted considerable research attention since the 1960s when control engineers ...
Lire la suiteCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Lire la suiteCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Lire la suiteThe benefits of reading this book are twofold. The first is an understanding of the stages of a new product development process ...
Lire la suiteDiscusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware ...
Lire la suiteExamines and demonstrates state-of-the-art approaches for IoT and Machine Learning based biomedical and health related applications. ...
Lire la suitePresents a comprehensive comparison of the performance of stochastic optimization algorithms Includes an introduction to ...
Lire la suiteDeep learning has been successfully applied to solve various complex problems ranging from big data analytics to computer ...
Lire la suiteThis book constitutes the thoroughly refereed post-proceedings of the International Workshop on Defence Applications of Multi-Agent ...
Lire la suiteIn this book defense and security related applications are increasingly being tackled by researchers and practioners using ...
Lire la suiteThis book deals with Article 7 TEU measures, court proceedings, financial sanctions and the EU Rule of Law Framework to ...
Lire la suiteDeformable Models: Biomedical and Clinical Applications is the first entry in the two-volume set which provides a wide cross-section ...
Lire la suiteThis volume provides a detailed discussion of the mathematical aspects and the physical applications of a new geometrical ...
Lire la suiteExamines the formulation of micro-nanosized drug delivery systems and recaps opportunities for using physical methods to ...
Lire la suiteThis open access book offers an exploration of delusions--unusual beliefs that can significantly disrupt people's lives. ...
Lire la suiteThe IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities ...
Lire la suiteThis volume presents the papers contributed to DEON 2006, the 8th Inter- tional Workshop on Deontic Logic in Computer Science, ...
Lire la suiteThis tutorial book gives an overview of the current state of the art in measuring the different aspects of dependability ...
Lire la suiteThis book presented fault-tolerant algorithms, software engineering of dependable systems, networking and mobile computing, ...
Lire la suiteContains the proceedings of the 'Second Latin-American Symposium' on Dependable Computing, LADC 2005. This book comprises ...
Lire la suite