This book constitutes the refereed proceedings of the 28th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2025, held in Milan, Italy, during June 3-4, 2025.
This book offers a comprehensive and systematic exploration of control design and analysis for interval type-2 fuzzy systems under constrained communication networks.
Este libro reune una serie de escrituras que abordan el cruce entre feminismos, giro afectivo y pensamiento situado para interrogar, en clave critica, la formacion, la investigacion y la intervencion en Trabajo Social.
The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security and Cryptology, Inscrypt 2025, held in Xi'an, China, on October 19, 2025.
This book is exploration into the forefront of digital evolution, presenting a compelling array of real-world case studies that underscore the transformative impact of emerging processes and services on asset management.
This book focuses on the integration of Artificial Intelligence (AI) technology for securing IoT next systems, exploring a comprehensive collection of recent techniques and strategies aimed at protecting these complex networks.
The scientific understanding of energy, matter, and spacetime has advanced rapidly, whereas the study of information—its properties, behavior, and dynamics—remains underdeveloped.
This book constitutes revised selected papers from the 5th International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2025, held in Hammamet, Tunisia, during April 26-27, 2025.
This volume, LNCS 16349, constitutes revised selected papers from the 10th International Symposium on Algorithmic Aspects of Cloud Computing, ALGOCLOUD 2025, held in Warsaw, Poland, during September 15–16, 2025.
The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security and Cryptology, Inscrypt 2025, held in Xi'an, China, on October 19, 2025.
This book constitutes the refereed proceedings of the 19th International Conference on Algorithmic Aspects in Information and Management, AAIM 2025, held in Ulaanbaatar, Mongolia, during June 23–25, 2025.
This book focuses on four key parts of the Blockchain ecosystem, which are the most relevant for financial services executives: Tokenomics and Digital Platforms, Markets, Privacy and the emerging phenomenon of Decentralized Autonomous Organizations (DAOs).
This book constitutes the refereed proceedings of the International Ethical Hacking Conference, eHaCON 2025, the 6th international conference of its type held in Kolkata, India, in February 2025.
This book constitutes the refereed proceedings of the 28th International Workshop on Job Scheduling Strategies for Parallel Processing, JSSPP 2025, held in Milan, Italy, during June 3-4, 2025.
The two-volume set LNCS 15751 + 15752 constitutes revised selected papers from the 29th International Conference on Financial Cryptography and Data Security, FC 2025, which took place in Miyakojima, Japan, during April 14–18, 2025.
This book offers a comprehensive and systematic exploration of control design and analysis for interval type-2 fuzzy systems under constrained communication networks.
This book constitutes the refereed proceedings of the International Ethical Hacking Conference, eHaCON 2025, the 6th international conference of its type held in Kolkata, India, in February 2025.
In an increasingly interconnected and complex world, businesses face environmental, social, and economic challenges that demand thoughtful reflection and a shift in operational approaches.
This book offers novel insights into how expert fund managers—those who demonstrate superior performance over the long term—make their judgments and decisions.
The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security and Cryptology, Inscrypt 2025, held in Xi'an, China, on October 19, 2025.
This book is the third in a series of books dedicated to publishing extended abstracts of the activities of ICMAM Latin America (International Community of Mathematicians from Latin America).
This book constitutes revised selected papers from the 5th International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2025, held in Hammamet, Tunisia, during April 26-27, 2025.
This book contains revised selected papers from the 32nd International Conference on Selected Areas in Cryptography, SAC 2025, held in Toronto, ON, Canada, in August 2025.
This volume, LNCS 16349, constitutes revised selected papers from the 10th International Symposium on Algorithmic Aspects of Cloud Computing, ALGOCLOUD 2025, held in Warsaw, Poland, during September 15–16, 2025.
This book is the third in a series of books dedicated to publishing extended abstracts of the activities of ICMAM Latin America (International Community of Mathematicians from Latin America).
This book represents a comprehensive exploration of the most recent advancements and applications at the intersection of machine learning, cyber-physical systems, and industrial processes.
Complementarity functions lie at the heart of modern optimization, offering a powerful way to reformulate the Karush-Kuhn-Tucker (KKT) conditions and the original optimization problem into more tractable forms, either as systems of equations or unconstrained minimization problems.
This book presents key technologies and applications of smart cities, covering a wide range of areas including smart transportation, autonomous driving, wireless communication, artificial intelligence, the Internet of Things (IoT), cybersecurity, digital twins, disaster management, environmental monitoring, and smart buildings.
This book constitutes the refereed proceedings of the 13th Ecuadorian Conference on Information and Communication Technologies, TICEC 2025, held in Quito, Ecuador, during October 16–17, 2025.
This book constitutes the refereed proceedings of the 13th Ecuadorian Conference on Information and Communication Technologies, TICEC 2025, held in Quito, Ecuador, during October 16–17, 2025.
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center.
Nonlinear models are indispensable in modern finance, yet their reliance on numerical root-finding methods introduces layers of complexity that demand careful attention.
This book presents a general approach to block and recursive filtering, identification, and control, using signal observations processing techniques, and among others provides to the reader these results:The new version of least square algorithm that is speeded up without changing its adaptive characteristics, increasing the parallelism in algorithm.
This book presents key technologies and applications of smart cities, covering a wide range of areas including smart transportation, autonomous driving, wireless communication, artificial intelligence, the Internet of Things (IoT), cybersecurity, digital twins, disaster management, environmental monitoring, and smart buildings.