This proceedings constitutes selected papers from the Workshops KGMA, SemiBDMA, MADM, AIEDM and STBDM which were held in conjunction with APWeb-WAIM 2024 which took place in Jinhua, China, August 30-September 1, 2024.
This new second edition of the successful 2016 Atlas of Adult Autopsy Practice is fully updated and refreshed with novel illustrations, and data refinements.
This new second edition of the successful 2016 Atlas of Adult Autopsy Practice is fully updated and refreshed with novel illustrations, and data refinements.
This book constitutes the refereed post-conference proceedings of the 4th International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2024, held in Szczecin, Poland, during June 24–26, 2024.
This book constitutes the refereed post-conference proceedings of the 4th International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2024, held in Szczecin, Poland, during June 24–26, 2024.
This book is about the trajectory of Indo-Afghanistan relations and its setting in the multilateral global order especially the interplay of the super-powers and the regional powers along with the emerging humanitarian crisis along with India's concern and insecurity dilemma that emerged due to Taliban 2.
This book is about the trajectory of Indo-Afghanistan relations and its setting in the multilateral global order especially the interplay of the super-powers and the regional powers along with the emerging humanitarian crisis along with India's concern and insecurity dilemma that emerged due to Taliban 2.
This 2-volume set LNCS 15495-15496 constitutes the refereed proceedings of the 25th International Conference on Cryptology in India, held in Chennai, India, during December 18-21, 2024.
This 2-volume set LNCS 15495-15496 constitutes the refereed proceedings of the 25th International Conference on Cryptology in India, held in Chennai, India, during December 18-21, 2024.
This book explores the identification of influencers in complex networks, bridging theoretical approaches with practical applications across diverse fields.
This book reveals the essence of endogenous or internal contradictions in cyberspace security issues, systematically expounds the principle of cyberspace endogenous security and safety, introduces the author-invented dynamic heterogeneous redundant (DHR) architecture with endogenous security and safety features, and theoretically answers why DHR endogenous security and safety architecture can enable network resilience engineering; the enabling role of DHR architecture solves the problem that network resilience cannot cope with unknown damage, lacks structural gain, and cannot quantify design measures.
This book reveals the essence of endogenous or internal contradictions in cyberspace security issues, systematically expounds the principle of cyberspace endogenous security and safety, introduces the author-invented dynamic heterogeneous redundant (DHR) architecture with endogenous security and safety features, and theoretically answers why DHR endogenous security and safety architecture can enable network resilience engineering; the enabling role of DHR architecture solves the problem that network resilience cannot cope with unknown damage, lacks structural gain, and cannot quantify design measures.
This book constitutes the refereed proceedings of the 22nd International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2024, held in Salamanca, Spain, during June 26-28, 2024.
This book constitutes the refereed proceedings of the 22nd International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2024, held in Salamanca, Spain, during June 26-28, 2024.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining, and software analysis.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining, and software analysis.
This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conference on Cryptology and Network Security, CANS 2024, held in Cambridge, United Kingdom during September 24-27, 2024.
The two-volume set LNCS 14973 and 14974 constitutes the proceedings of the 14th International Conference on Security and Cryptography for Networks, SCN 2024, which took place in Amalfai, Italy, during September 11-13, 2024.
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
This four-volume set LNCS 14982-14985 constitutes the refereed proceedings of the 29th European Symposium on Research in Computer Security, ESORICS 2024, held in Bydgoszcz, Poland, during September 16-20, 2024.
This book explores the identification of influencers in complex networks, bridging theoretical approaches with practical applications across diverse fields.
The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024.
The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024.
The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024.
The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024.
The two-volume set LNCS 14973 and 14974 constitutes the proceedings of the 14th International Conference on Security and Cryptography for Networks, SCN 2024, which took place in Amalfai, Italy, during September 11-13, 2024.
This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conference on Cryptology and Network Security, CANS 2024, held in Cambridge, United Kingdom during September 24-27, 2024.
This book integrates the fundamentals of asymmetric multidimensional scaling, spectral graph theory, graph embedding theory, and various dynamical systems theories, that deal with the static and dynamic aspects of asymmetric phenomena.
This book integrates the fundamentals of asymmetric multidimensional scaling, spectral graph theory, graph embedding theory, and various dynamical systems theories, that deal with the static and dynamic aspects of asymmetric phenomena.
This book constitutes the refereed proceedings of the 12th Annual Privacy Forum on Privacy Technologies and Policy, APF 2024, held in Karlstad, Sweden, during September 4-5, 2024.
This book aims to present the topic of nonlinear and chaotic dynamics in a manner that is useful and beneficial to students and young researchers from various domains such as physics, mathematics, biology, or even medicine.
This LNCS volume constitutes the referred proceedings of 35th Australasian Database Conference, ADC 2024, held in Gold Coast, QLD, Australia and Tokyo, Japan, during December 16-18, 2024.