Free Delivery Over $100
14262 books were found.
Over the past years, the rapid growth of the Internet and World Wide Web has provided great opportunities for online... Read More >>
Although it has been mooted whether the dramatic technological advances in neurological practice, (i.e., neuroimaging)... Read More >>
<p>This book presents selected proceedings from the 22nd biennial IFIP conference on System Modeling and Optimization,... Read More >>
„Signale und Systeme“ ist als Lehr- und Arbeitsbuch für Studierende der Informationstechnik, Nachrichtentechnik,... Read More >>
Brings together the fields of communication, signal processing, and embedded systems and circuits to help design... Read More >>
Dieses Lehrbuch gibt eine fundierte Aoebersicht A1/4ber die Kryptographie und stellt die wichtigsten klassischen... Read More >>
Written by Ron Alterovitz and Ken Goldberg, this monograph combines ideas from robotics, physically-based modeling,... Read More >>
<p>This book explains weak, short-duration and low probability interactions, and shows how they function as connecting... Read More >>
<p>This volume contains papers contributed to The Second Multidisciplinary Symposium on Positive Systems: Theory... Read More >>
This unique monograph introduces an important new area of control system research and presents some new methods... Read More >>
<p>This book constitutes the refereed proceedings of the 11th Australasian Conference on Information Security and... Read More >>
This is the first unified treatment of fuzzy modeling and fuzzy control, providing tools for control of complex... Read More >>
Constitutes the refereed proceedings of the 6th IFIP WG 12.5 International Conference on Artificial Intelligence... Read More >>
This book aims to provide current scientists as well as future generations with a historical overview of the... Read More >>
Multivariate public key cryptosystems (MPKC) is a fast-developing area in cryptography. This book systematically... Read More >>
Covers a majority of the subjects that make up cryptology, including symmetric or public-key cryptography, cryptographic... Read More >>
<p>Software that covertly monitors user actions, also known as spyware, has become a first-level security threat... Read More >>
<p>While conceptually elegant, the generic formulations of nonlinear model predictive control are not ready to use... Read More >>
There have been significant developments in robust control of time-delay systems. This title presents a systematic... Read More >>
<p>This book is a crystallization of the authors' work over the last twenty-five years. The book covers the latest... Read More >>
This volume introduces new approaches to modeling strongly nonlinear behaviour of structural mechanical units: beams,... Read More >>
Authored by two of the field's most prominent researchers, this new edition has been comprehensively updated, with... Read More >>
<p>Today's enterprises have to continuously extend their operational limits to earn profit, thrive and prosper.... Read More >>
This book examines Britain's highly acclaimed approach to cost-effectiveness analysis and its international potential.... Read More >>
The second part of a two-volume work, presenting an account of the theory of quadratic cost optimal control for... Read More >>