Mutierte Pflanzen, die Wolkenkratzer wie Schokolade schmelzen lassen, eine pubertierende KI, die ...
Sechs Geschichten von heute über morgen - der Name ist Programm: Dieser Sammelband gibt einen Ein...
The subject of this book centres around trustworthy machine learning under imperfect data. It is ...
This book presents a systematic and comprehensive overview of the authors' recent innovative rese...
Reservoirs are specific aquatic ecosystems and have complex behaviors of both natural lakes and r...
This book provides a comprehensive study of the state of the art in location privacy for mobile a...
This two volume set constitutes the refereed post-conference proceedings of the Second Internatio...
This book introduces a unique, packet-based co-design control framework for networked control sys...
This two volume set of LNAI 11061 and LNAI 11062 constitutes the refereed proceedings of the 11th...
Computational intelligence techniques are becoming more and more important for automated problem ...
Cette étude se propose de découvrir, à travers l'image holographique restituée petit à petit, les...
Reservoirs are specific aquatic ecosystems and have complex behaviors of both natural lakes and r...
This book introduces a unique, packet-based co-design control framework for networked control sys...
This book presents a new perspective on so far neglected important areas in clinical sport psycho...
Plant cells house highly dynamic cytoskeletal networks of microtubules and actin microfilaments.T...
This book constitutes the refereed proceedings at PAKDD Workshops 2013, affiliated with the 17th ...
Plant cells house highly dynamic cytoskeletal networks of microtubules and actin microfilaments.T...
The GMRES algorithm and ILU preconditioners are among the most commonly used methods for solving ...
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons...
This is the first book to introduce UUDN for 5G, including the concept, challenges, architecture ...
Unser bisheriger Preis:ORGPRICE: 58,84 €
This book focuses on the design methods for reconfigurable computing processors for cryptographic...
Computational intelligence techniques are becoming more and more important for automated problem ...
Calcium looping process (CLP), which uses reversible reactions of CaO carbon dioxide for capturin...
This book focuses on the design methods for reconfigurable computing processors for cryptographic...
This two volume set constitutes the refereed post-conference proceedings of the Second Internatio...
This two volume set of LNAI 11061 and LNAI 11062 constitutes the refereed proceedings of the 11th...
The differential quadrature hierarchical finite element method (DQHFEM) was proposed by Bo Liu. T...
ben shu zai fen xi duo gu zhang zan tai wen ding yue shu zui you chao liu gui ji ling min du fa c...
This book constitutes the refereed proceedings of the 6th China Conference on Knowledge Graph and...
ben shu yi gai jin de SLP li lun zai FG shou ji zhi zao chang bu ju zhong de shi ji ying yong wei...
ben shu xi tong de chan shu le wu han da xue tie ying guang ji guang lei da de gong zuo yuan liji...
ben shu wei yan jiu ying erchuang xin zhuan an zhi you guan zao xingji gou yu jie gou de she ji l...
bi zuo lei hua he wu shi yi zhong ju you guang fan sheng wu huo xing de za huan hua he wubu jin j...
sui zhao hu lian wangxia yi dai wang luo deng xin xi ji shu de chu xiankuan dai yong hu liang ji ...
This conference proceeding is a collection of the papers accepted by the CENet2021 ¿ the 11th Int...
The book focuses on the Internet of Things and Beidou system application. Both principles and eng...
A critical challenge in deep learning is the vulnerability of deep learning networks to security ...
Unser bisheriger Preis:ORGPRICE: 181,89 €
This book provides a thorough overview of the state-of-the-art field-programmable gate array (FPG...
This two-volume set of LNCS 13598 and 13599 constitutes the refereed proceedings of the 17th Inte...
This two-volume set of LNCS 13598 and 13599 constitutes the refereed proceedings of the 17th Inte...
This conference proceeding is a collection of the papers accepted by the CENet2021 - the 11th Int...
The book focuses on the Internet of Things and Beidou system application. Both principles and eng...
This conference proceedings is a collection of the accepted papers of ISCC2023 - the 7th Internat...
A critical challenge in deep learning is the vulnerability of deep learning networks to security ...
This book provides state-of-the-art Face De-Identification techniques and privacy protection meth...
This conference proceedings is a collection of the accepted papers of ISCC2023 - the 7th Internat...
This book comprehensively introduces innovative technologies for practical applications in apple ...