This book presents select, recent developments in nonlinear and complex systems reported at the 1st Online Conference on Nonlinear Dynamics and Complexity, held on November 23-25, 2020.
Control of Discrete-Time Descriptor Systems takes an anisotropy-based approach to the explanation of random input disturbance with an information-theoretic representation.
This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held in Singapore, in November 2020.
This book constitutes the refereed post-conference proceedings of the 16th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2021, held in December 2021, and the 14th International Conference on Wireless Internet, WiCON 2021, held in November 2021.
The theme of this volume on systems engineering research is disciplinary convergence: bringing together concepts, thinking, approaches, and technologies from diverse disciplines to solve complex problems.
This book aims to provide a detailed understanding of IoMT-supported applications while engaging premium smart computing methods and improved algorithms in the field of computer science.
Information and communication technologies have provided great advances in fields such as medicine, industry, telecommunications, education, environmental protection, and more.
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers.
This book constitutes the refereed proceedings of the 14th Annual Conference on Theory and Applications of Models of Computation, TAMC 2017, held in Bern, Switzerland, in April 2017.
This book constitutes the revised selected papers of the 10th International Workshop on Data Privacy Management, DPM 2015, and the 4th International Workshop on Quantitative Aspects in Security Assurance, QASA 2015, held in Vienna, Austria, in September 2015, co-located with the 20th European Symposium on Research in Computer Security, ESORICS 2015.
The three-volume set, consisting of LNCS 10116, 10117, and 10118, contains carefully reviewed and selected papers presented at 17 workshops held in conjunction with the 13th Asian Conference on Computer Vision, ACCV 2016, in Taipei, Taiwan in November 2016.
This two-volume set constitutes the refereed proceedings of the 15th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2021, held as part of the 23rd International Conference, HCI International 2021, held as a virtual event, in July 2021.
In the new edition of Neural Assemblies, the author places his original ideas and motivations within the framework of modern and cognitive neuroscience and gives a short and focused overview of the development of computational neuroscience and artificial neural networks over the last 40 years.
This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017.
This book constitutes the refereed proceedings of the 10th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2018, held in Marrakesh, Morocco, in May 2018.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security for Information Technology and Communications, SecITC 2017, held in Bucharest, Romania, in June 2017.
Dynamic Behavior of Materials, Volume 1 of the Proceedings of the 2021 SEM Annual Conference & Exposition on Experimental and Applied Mechanics, the first volume of six from the Conference, brings together contributions to this important area of research and engineering.
This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located with the 25th European Symposium on Research in Computer Security, ESORICS 2020.
This textbook is appropriate for use in graduate-level curricula in analog-to-digital conversion, as well as for practicing engineers in need of a state-of-the-art reference on data converters.
Chapter "e;A Systematic Literature Review of Information Sources for Threat Modeling in the Power Systems Domain"e; is available open access under a Creative Commons Attribution 4.
This book constitutes the refereed post-conference proceedings of the 13th International Conference on Ad Hoc Networks, ADHOCNETS 2021, held in December 2021, and the 16th International Conference on Tools for Design, Implementation and Verification of Emerging Information Technologies, TRIDENTCOM 2021, held in November 2021.
This book paves the road for researchers from various areas of engineering working in the realm of smart cities to discuss the intersections in these areas when it comes to infrastructure and its flexibility.
This volume constitutes selected papers presented at the Second International Symposium on Emerging Information Security and Applications, EISA 2021, held in Copenhagen, Denmark, in November 2021.
This volume is part of collection of contributions devoted to analytical and experimental techniques of dynamical systems, presented at the 15th International Conference "e;Dynamical Systems: Theory and Applications"e;, held in Lodz, Poland on December 2-5, 2019.
This book presents how to program Single Board Computers (SBCs) for Internet of Things (IoT) rapid prototyping with popular tools such as Raspberry Pi, Arduino, Beagle Bone, and NXP boards.
The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017.
This volume constitutes selected papers presented at the First International Conference on Engineering Software for Modern Challenges, ESMoC 2021, held in Johor, Malaysia, in October 20-21, 2021.
This book constitutes the thoroughly refereed conference proceedings of the 12th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2017, held in Lisbon, Portugal, in September 2017.
The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the refereed proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2022, which was held in Trondheim, Norway, during 30 May - 3 June, 2022.
This book illustrates the main modern mineralogical analytical procedures that can be applied for forensic purposes on various typologies of materials and substances and has both theoretical and practical approach.
This edited monograph contains research contributions on a wide range of topics such as stochastic control systems, adaptive control, sliding mode control and parameter identification methods.
The importance of thermodynamics, particularly its Second Principle, to all branches of science in which systems with very large numbers of particles are involved cannot be overstated.
Communication-Protocol-Based Filtering and Control of Networked Systems is a self-contained treatment of the state of the art in communication-protocol-based filtering and control; recent advances in networked systems; and the potential for application in sensor networks.
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
Perturbation Methods in Science and Engineering provides the fundamental and advanced topics in perturbation methods in science and engineering, from an application viewpoint.