The six-volume set LNCS 10404-10409 constitutes the refereed proceedings of the 17th International Conference on Computational Science and Its Applications, ICCSA 2017, held in Trieste, Italy, in July 2017.
This book is an introduction to a comprehensive and unified dynamic transition theory for dissipative systems and to applications of the theory to a range of problems in the nonlinear sciences.
This book constitutes the proceedings of the 6th International Conference on Algorithms and Discrete Applied Mathematics, CALDAM 2020, held in Hyderabad, India, in February 2020.
This book constitutes the proceedings of the 25th International Conference on Parallel and Distributed Computing, Euro-Par 2019, held in Gottingen, Germany, in August 2019.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Gerotechnology, IWoG 2019, held in Caceres, Spain, in September 2019.
Evolutionary algorithms constitute a class of well-known algorithms, which are designed based on the Darwinian theory of evolution and Mendelian theory of heritage.
Dieses prägnante Lehrbuch führt einen Systemansatz in die Technik ein und beschreibt tribologische, mechatronische und cyber-physikalische Systeme sowie das technologische Konzept der Industrie 4.
Highlighting the progress made by researchers in using Web-based surveys for data collection, this timely volume summarizes the experiences of leading behavioral and social scientists from Europe and the US who collected data using the Internet.
This authoritative book presents a comprehensive account of the essential roles of nonlinear dynamic and chaos theories in understanding, modeling, and forecasting hydrologic systems.
This is the first book to demonstrate the application of power analysis to the newer more advanced statistical techniques that are increasingly used in the social and behavioral sciences.
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China.
Finding Your Ethical Research Self introduces novice researchers to the need for ethical reflection in practice and gives them the confidence to use their knowledge and skill when, later as researchers, they are confronted by big ethical moments in the field.
This book presents the latest in decision-making tools, techniques, and solutions for policy makers to utilize in overcoming the challenges faced by healthcare systems.
This monograph introduces the theory of generalized homogeneous systems governed by differential equations in both Euclidean (finite-dimensional) and Banach/Hilbert (infinite-dimensional) spaces.
Here, the authors present modern methods of analysis for nonlinear systems which may occur in fields such as physics, chemistry, biology, or economics.
This textbook covers the fundamental theories of signals and systems analysis, while incorporating recent developments from integrated circuits technology into its examples.
Applied Statistics for the Social and Health Sciences provides graduate students in the social and health sciences with the basic skills that they need to estimate, interpret, present, and publish statistical models using contemporary standards.
This unique book provides a platform for resilience research, combining knowledge from various domains, such as genetics, primatology, archeology, geography, physical anthropology, cultural anthropology, medicine, ecology, psychology, risk management and systems science, in order to examine specific concepts.
This volume presents selected papers from the International Conference on Urban Intelligence and Applications (ICUIA), which took place on May 10-12, 2019 in Wuhan, China.
For the past 150 years, economics has been treated as a social science in which economies are modeled as a circular flow of income between producers and consumers.
Feminist research is informed by a history of breaking silences, of demanding that women's voices be heard, recorded and included in wider intellectual genealogies and histories.
Temporality in Qualitative Inquiry explores the relationship between time and qualitative research and unpacks some of the conceptual, methodological, practical, and pragmatic areas of qualitative inquiry related to time and temporality.
A theory is the more impressive, the simpler are its premises, the more distinct are the things it connects, and the broader is its range of applicability.
Work with over 150 real-world examples of threat manifestation in software development and identify similar design flaws in your systems using the EoP game, along with actionable solutionsKey FeaturesApply threat modeling principles effectively with step-by-step instructions and support materialExplore practical strategies and solutions to address identified threats, and bolster the security of your software systemsDevelop the ability to recognize various types of threats and vulnerabilities within software systemsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionAre you looking to navigate security risks, but want to make your learning experience fun?
An ethnographic study of anti-nuclear movement groups that both challenges assumptions of traditional social movement studies of strategic action and shows what can be gained through microanalysis of talk in meetings, this book advances social movement studies methodologically and theoretically through the application of a new method of sequential analysis.
This book constitutes the refereed proceedings of the 5th International Workshop on Post-Quantum Cryptography, PQCrypto 2013, held in Limoges, France, in June 2013.
Die Reihe präsentiert Beiträge der qualitativen Sozialforschung, die empirisch anspruchsvolle Untersuchungen mit einem Interesse an soziologischer Theorie verbinden.