This book constitutes the refereed proceedings of the 23rd International Workshop on Approximation and Online Algorithms, WAOA 2025, held in Warsaw, Poland, during September 18–19, 2025.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
This book discusses the development and application of dynamic neural networks (DNNs) for solving complex motion control problems in redundant manipulators.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
This book discusses the development and application of dynamic neural networks (DNNs) for solving complex motion control problems in redundant manipulators.
The 8-volume set LNCS 16000-16008 constitutes the proceedings of the 45th Annual International Cryptology Conference, CRYPTO 2025, which took place in Santa Barbara, CA, USA, during August 17-21, 2025.
This book constitutes the refereed proceedings of the 9th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2025, held in Medellín, Colombia, in October 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
The four-volume set LNCS 16268-16271 constitutes the refereed proceedings of the 23rd International Conference on Theory of Cryptography, TCC 2025, held in Aarhus, Denmark, during December 1–5, 2025.
This three-set volume LNCS 16217-16219 constitutes the refereed proceedings of 27th International Conference on Information and Communications Security, ICICS 2025, held in Nanjing, China, during October 29–31, 2025.
This textbook, now in its third edition, provides a broad and accessible introduction to both continuous and discrete dynamical systems, the theory of which is motivated by examples from a wide range of disciplines.
This two-set volume LNAI 16138-16139 constitutes the refereed proceedings of the 17th International Conference on Computational Collective Intelligence, ICCCI 2025, held in Ho Chi Minh City, Vietnam, during November 12–15, 2025.
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012.
This two-set volume LNAI 16138-16139 constitutes the refereed proceedings of the 17th International Conference on Computational Collective Intelligence, ICCCI 2025, held in Ho Chi Minh City, Vietnam, during November 12–15, 2025.
This book constitutes the refereed proceedings of the workshops held at the 44th International Conference on Conceptual Modeling, ER 2025, which took place in Poitiers, France, during October 20–23, 2025.
This book constitutes the proceedings of the 27th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2025, held in Kathmandu, Nepal, during October 9–11, 2025.
This textbook, now in its third edition, provides a broad and accessible introduction to both continuous and discrete dynamical systems, the theory of which is motivated by examples from a wide range of disciplines.
This two-set volume LNAI 16138-16139 constitutes the refereed proceedings of the 17th International Conference on Computational Collective Intelligence, ICCCI 2025, held in Ho Chi Minh City, Vietnam, during November 12–15, 2025.
This book refers to an innovative and comprehensive convergence of modern computing systems and intelligent communication networks with latest computing technologies, including edge computing, 5G/6G networks, Internet of Things (IoT), artificial intelligence (AI), machine learning (ML), and blockchain-driven communication systems, and also provides information about how advanced processors work with edge integration and parallel computing to deliver faster data analysis and how AI incorporates with ML for decision making , predicative analysis, and automation This book approaches its subject by seamlessly integrating foundational principles with the latest advancements in smart computing What sets this work apart is its multidisciplinary perspective—blending computing, electronics, information theory, and real-time communications to address the challenges and opportunities of next-generation intelligent networks.
These proceedings of the 18th International Conference on Difference Equations and Applications cover a number of different aspects of difference equations and discrete dynamical systems, as well as the interplay between difference equations and dynamical systems.
This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015.
This volume contains the proceedings of the 19th International Conference on Difference Equations and Applications, held at Sultan Qaboos University, Muscat, Oman in May 2013.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Workshop on Fast Software Encryption, held in Singapore, March 11-13, 2013.
This book constitutes the proceedings of the 20th International Conference on Selected Areas in Cryptography, SAC 2013, held in Burnaby, Canada, in August 2013.
This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2011, held in Madrid, Spain, in May 2011.
The volume LNCS 8155 constitutes the refereed proceedings of the 19th International Workshop on Cellular Automata and Discrete Complex Systems, AUTOMATA 2013, held in Giessen, Germany, in September 2013.
This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013.
This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013.
This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012.
This book constitutes the refereed proceedings of 12 international workshops held in Tallinn, Estonia, in conjunction with the 10th International Conference on Business Process Management, BPM 2012, in September 2012.
This book constitutes revised selected papers from the 7th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2012, held in Tokyo, Japan, in May 2012.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011.
This book constitutes the refereed proceedings of the International Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012.