This two-volume set CCIS 2736-2737 constitutes the revised selected papers of the 6th International Conference on Machine Learning, Image Processing, Network Security and Data Sciences, MIND 2024, held in Goa, India, during December 20–21, 2024.
This book offers a comprehensive roadmap for securing modern digital supply chains by weaving together foundational theory, organizational strategy, and advanced technologies.
This volume constitutes the revised selected papers of the 29th International Workshop on Coordination, Organizations, Institutions, Norms, and Ethics for Governance of Multi-Agent Systems, COINE 2025, held in Detroit, MI, USA, on May 20, 2025.
This volume constitutes the revised selected papers of the 29th International Workshop on Coordination, Organizations, Institutions, Norms, and Ethics for Governance of Multi-Agent Systems, COINE 2025, held in Detroit, MI, USA, on May 20, 2025.
This book offers a historical and analytical study of the origins of holomorphic dynamics—a field linking analytic functions with the behavior of iterated orbits.
This two-volume set CCIS 2736-2737 constitutes the revised selected papers of the 6th International Conference on Machine Learning, Image Processing, Network Security and Data Sciences, MIND 2024, held in Goa, India, during December 20–21, 2024.
This book constitutes the refereed proceedings of the 14th Latin-American Symposium on Dependable and Secure Computing, LADC 2025, which took place in Valparaiso, Chile, during October 27-31, 2025.
This book constitutes the refereed proceedings of the 14th Latin-American Symposium on Dependable and Secure Computing, LADC 2025, which took place in Valparaiso, Chile, during October 27-31, 2025.
This book provides an introduction to nonsmooth constrained optimal control theory over infinite horizon, tackling the mathematical challenges that arise when classical finite-horizon methods prove inadequate.
“Blockchain-based Web of Things Security: Advances, Challenges, and Solutions” offers a concise yet comprehensive exploration of how blockchain technologies can enhance the security and trustworthiness of the Web of Things (WoT).
This book provides an introduction to nonsmooth constrained optimal control theory over infinite horizon, tackling the mathematical challenges that arise when classical finite-horizon methods prove inadequate.
This book LNCS 16213 constitutes the refereed proceedings of the 29th International Conference on Enterprise Design, Operations, and Computing, EDOC 2025, held in Lisbon, Portugal, during September 9–12, 2025.
This book is devoted to the study of international experience and prospects for the development of smart transport systems and the digital economy infrastructure.
This book LNCS 16213 constitutes the refereed proceedings of the 29th International Conference on Enterprise Design, Operations, and Computing, EDOC 2025, held in Lisbon, Portugal, during September 9–12, 2025.
This book is devoted to the study of international experience and prospects for the development of smart transport systems and the digital economy infrastructure.
This book explores various aspects of knowledge graph reasoning to solve different tasks, encompassing first, traditional symbolic methods for knowledge graph reasoning; second, recent developments in neural-based knowledge graph reasoning techniques; and third, cutting-edge advancements in neural-symbolic hybrid approaches to knowledge graph reasoning.
This book summarizes the research progress and results, presenting the theoretical foundations, generation methods, circuit implementations, andpractical applications of chaotic circuits and systems with various multiscroll attractors.
This book summarizes the research progress and results, presenting the theoretical foundations, generation methods, circuit implementations, andpractical applications of chaotic circuits and systems with various multiscroll attractors.
This book explores the research on applications for smart cities, education, healthcare, industry and business through the integration of cloud computing, IoT and extended reality.
This book explores the research on applications for smart cities, education, healthcare, industry and business through the integration of cloud computing, IoT and extended reality.
This edited volume introduces undergraduate students to several diverse and emerging research topics in three major areas of risk management: actuarial science, mathematical finance, and sports analytics.
This edited volume introduces undergraduate students to several diverse and emerging research topics in three major areas of risk management: actuarial science, mathematical finance, and sports analytics.
Les sciences sont au c ur des grandes problematiques actuelles, de la lutte contre le changement climatique a la gestion des crises environnementales et sanitaires.
Fundamentals of Statistics for Researchers and Data Analysts explains statistical methods, and the assumptions and prerequisites for applying various analytical tools from an statistical point of view.
Fundamentals of Statistics for Researchers and Data Analysts explains statistical methods, and the assumptions and prerequisites for applying various analytical tools from an statistical point of view.
The origins of this book go back more than twenty years when, funded by small grants from the European Union, the control theory groups from the universities of Bremen and Warwick set out to develop a course in ?
This book explores various aspects of knowledge graph reasoning to solve different tasks, encompassing first, traditional symbolic methods for knowledge graph reasoning; second, recent developments in neural-based knowledge graph reasoning techniques; and third, cutting-edge advancements in neural-symbolic hybrid approaches to knowledge graph reasoning.
This book comprehensively examines the communication challenges posted by regulating large-scale flexible loads These challenges include high access demands, explosive data volume, frequent data transmission, realistic performance-based impact analysis, and security concerns.
This comprehensive collection presents cutting-edge research at the intersection of cybersecurity, artificial intelligence, and emerging technologies for critical infrastructure protection.
Nonautonomous dynamical systems provide a mathematical framework for temporally changing phenomena, where the law of evolution varies in time due to seasonal, modulation, controlling or even random effects.