This volume sheds light on the current state of complex networks and nonlinear dynamics applied to the understanding of economic and social phenomena ranging from geographical economics to macroeconomics and finance, and its purpose is to give readers an overview of several interesting topics for research at an intermediate level.
This book is concerned with the variance-constrained optimized filtering problems and their potential applications for nonlinear time-varying dynamical systems.
Geodesic and Horocyclic Trajectories presents an introduction to the topological dynamics of two classical flows associated with surfaces of curvature -1, namely the geodesic and horocycle flows.
Nanotechnology in biology and medicine: Research advancements & future perspectives is focused to provide an interdisciplinary, integrative overview on the developments made in nanotechnology till date along with the ongoing trends and the future prospects.
This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students and practitioners a unique update on the latest advances in theory and a multitude of applications.
This book constitutes the refereed proceedings of the 12th International Conference on Optimization and Applications, OPTIMA 2021, held in Petrovac, Montenegro, in September - October 2021.
This three-volume set LNCS 15825-15827 constitutes the proceedings of the 23rd International Conference on Applied Cryptography and Network Security, ACNS 2025, held in Munich, Germany, during June 23-26, 2025.
The 5-volume proceedings, LNAI 12457 until 12461 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2020, which was held during September 14-18, 2020.
With many areas of science reaching across their boundaries and becoming more and more interdisciplinary, students and researchers in these fields are confronted with techniques and tools not covered by their particular education.
The book features original papers from International Conference on Expert Clouds and Applications (ICOECA 2022), organized by GITAM School of Technology, Bangalore, India, during 3-4 February 2022.
This book comprehensively introduces readers to Digital Twins, from the basic concepts, core technologies and technical architecture, to application scenarios and other aspects.
Forensic Investigation of Stolen-Recovered and Other Crime-Related Vehicles provides unique and detailed insights into the investigations of one of the most common crime scenes in the world.
This book presents recent theoretical advances in the analysis and synthesis of discrete-time switched systems under the time-dependent switching scheme, including stability and disturbance attenuation performance analysis, control and filtering, asynchronous switching, finite-time analysis and synthesis, and reachable set estimation.
Provides a comprehensive and up-to-date review of the development of the science behind the psychology of false confessions Four decades ago, little was known or understood about false confessions and the reasons behind them.
Nervous System Actions and Interactions: Concepts in Neurophysiology approaches the nervous system from a functional, rather than structural, point of view.
This two-volume set constitutes the post-conference proceedings of the 5th EAI International Conference on Advanced Hybrid Information Processing, ADHIP 2021, held in October 2021.
Blackstone's Emergency Planning, Crisis, and Disaster Management is a practical guide for those involved in all aspects of emergency preparedness, resilience, and response.
This textbook provides a comprehensive exploration of anomalous stochastic processes and extreme events, commonly referred to as "e;black swans,"e; with a particular focus on (multi-)fractal approaches and continuous-time random walks.
This book is intended as reference material for students and professors interested in air pollution modeling at the graduate level as well as researchers and professionals involved in developing and utilizing air pollution models.
Simulation of ODE/PDE Models with MATLAB(R), OCTAVE and SCILAB shows the reader how to exploit a fuller array of numerical methods for the analysis of complex scientific and engineering systems than is conventionally employed.
This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018.
This book contains a compilation of the revised and extended versions of the best papers presented at the 16th International Joint Conference on E-Business and Telecommunications, ICETE 2019, held in Prague, Czech Republic, in July 2019.
The new computing environment enabled by advances in service oriented arc- tectures, mashups, and cloud computing will consist of service spaces comprising data, applications, infrastructure resources distributed over the Web.
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology and Network Security, CANS 2013, held in Paraty, Brazil, in November 2013.
Death Investigation: A Field Guide, Second Edition is updated and expanded to include a chronological analysis of the death scene investigative process from the first notification to the autopsy and final report.
With contributions from well-known experts, this volume discusses clinical assessment, management, and treatment of offenders with mental disorders, including treatment in a range of secure hospital facilities, in prisons, and in the community.
This book presents the foundation of the theory of almost automorphic functions in abstract spaces and the theory of almost periodic functions in locally and non-locally convex spaces and their applications in differential equations.
This book presents a selection of the talks resulting from research carried out by different groups at the Centre de Recerca Matematica and presented at the International Congress on Industrial and Applied Mathematics, held in Valencia in 2019.
In passato, l’arte della “scrittura nascosta” (meglio nota come crittografia) era per lo più riferita ad un insieme di metodi per nascondere il contenuto di un dato messaggio agli occhi di lettori non autorizzati.