This short primer offers non-specialist readers a concise, yetcomprehensive introduction to the field of classical fluids providing bothfundamental information and a number of selected topics to bridge the gapbetween the basics and ongoing research.
This book presents simple design paradigms related to lightweight design, that are derived from an in-depth and theoretically sound analysis based on Pareto theory.
Fuzzy Logic: State of the Art covers a wide range of both theory and applications of fuzzy sets, ranging from mathematical basics, through artificial intelligence, computer management and systems science to engineering applications.
This book constitutes the refereed post-conference proceedings of the 6st International Conference on IoT as a Service, IoTaaS 2020, which took place in Xi'an, China, in November 2020.
This book constitutes the proceedings of the 11th Ecuadorian Conference on Information and Communication Technologies, TICEC 2023, held in Cuenca, Ecuador, during October 18-20, 2023.
This volume aims at assessing the current approaches and technologies, as well as to outline the major challenges and future perspectives related to the security and privacy protection of social networks.
This book is an edited selection of the papers presented at the International Workshop on VLSI for Artifidal Intelligence and Neural Networks which was held at the University of Oxford in September 1990.
This book constitutes the refereed proceedings of the 20th International Conference on Software Engineering and Formal Methods, SEFM 2022, which took place in Berlin, Germany, in September 2022.
The LNCS two-volume set 13905 and LNCS 13906 constitutes the refereed proceedings of the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Tokyo, Japan, during June 19-22, 2023.
Quite apart from the fact that percolation theory had its ongm in an honest applied problem, it is a source of fascinating problems of the best kind for which a mathematician can wish: problems which are easy to state with a minimum of preparation, but whose solutions are apparently difficult and require new methods.
This book constitutes the refereed post-conference proceedings of the IFIP TC 3 Open Conference on Computers in Education, OCCE 2018, held in Linz, Austria, in June 2018.
This book presents a new understanding on how control systems truly operate, and explains how to recognize, simulate, and improve control systems in all fields of activity.
This volume constitutes short papers and DETECT 2022 workshop papers, presented during the 11th International Conference on Model and Data Engineering, MEDI 2022, held in Cairo, Egypt, in November 2022.
Simulation may be defined as the discipline whose objective is to imitate one or more aspects of reality in a way that is as close to that reality as possible; indeed, an apt synonym that is gaining some currency is artificial reality.
Statistische Mechanik ist eine deduktive Darstellung des Gleichgewichts basierend auf einer einzigen Hypothese - der Form der mikrokanonischen Dichtematrix.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Quebec City, QC, Canada, in October 2016.
Robust and Adaptive Control (second edition) shows readers how to produce consistent and accurate controllers that operate in the presence of uncertainties and unforeseen events.
This book offers teaching/training professionals an evidence-based pedagogic guide to teaching effectively, efficiently and creatively - also known as Creative Teaching Competence.
This book constitutes the refereed post-conference proceedings of the IFIP TC 3 Open Conference on Computers in Education, OCCE 2020, held in Mumbai, India, in January 2020.
This book systematically presents a fundamental theory for the local analysis of bifurcation and stability of equilibriums in nonlinear dynamical systems.
In earlier forewords to the books in this series on Discrete Event Dynamic Systems (DEDS), we have dwelt on the pervasive nature of DEDS in our human-made world.
Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models.
With the given work we decided to help not only the readers but ourselves, as the professionals who actively involved in the networking branch, with understanding the trends that have developed in recent two decades in distributed systems and networks.