Intense global competition in manufacturing has compelled manufacturers to incorporate repetitive processing and automation ...
Lire la suiteThis work proposes to apply the Sliding Regimes (RG) algorithms to industrial regulation and servo loops controlled to date ...
Lire la suiteTime-dependent scheduling involves problems in which the processing times of jobs depend on when those jobs are started. ...
Lire la suiteNetwork flow optimization analyzes optimization problems on networks; hence, network optimization is reflected in many application ...
Lire la suiteThis is Part II: concurrent and distributed systems; monitoring and runtime verification; hybrid and stochastic systems; ...
Lire la suiteThe book is organized in topical sections on parameterized systems, model checking, applications, static analysis, concurrent/distributed ...
Lire la suiteMost topics dealt with here deal with complex analysis of both one and several complex variables. Several contributions come ...
Lire la suiteThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Lire la suiteThis volume includes lecture notes devoted to the asymptotic analysis of such problems when the multi-scale behaviour derives ...
Lire la suiteTopological bifurcation theory is one of the most essential topics in mathematics. This book contains original bifurcation ...
Lire la suiteThis book presents computational paradigms describing lower- and higher-level cognitive functions, including mechanisms of ...
Lire la suiteToday’s mobile robot perception is insufficient for acting goal-directedly in unconstrained, dynamic everyday environments ...
Lire la suiteAt the beginning of the 21st century, manufacturing industry is faced with new challenges stemming from globalization and ...
Lire la suiteThis book contains four highly detailed papers. The first paper focuses on quantitative aspects of the bgl operon for E.coli. ...
Lire la suiteThe first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
Lire la suiteThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Lire la suiteIt contains teaching concurrency; process languages; process mining; software engineering; state space visualisation techniques; ...
Lire la suiteThis volume collects essays that broadly encompass the digital arts, Transdisciplinary Digital Art gives a clear overview ...
Lire la suiteBased on case studies, this book illustrates the complex challenges faced by healthcare administrators when implementing ...
Lire la suiteThis book constitutes the thoroughly refereed proceedings of the 33rd International Conference on Industrial, Engineering ...
Lire la suite