Free Delivery Over $100
88552 books were found.
This book focuses on dissipative Caputo fractional differential equations (FDEs) with an autonomous vector field.... Read More >>
This volume constitutes the proceedings of Third International Conference on Artificial Intelligence of Things and... Read More >>
The two-volume set LNCS 15751 + 15752 constitutes revised selected papers from the 29th International Conference... Read More >>
This three-volume set CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference on... Read More >>
This three-volume set, CCIS 2637-2639 , constitutes the refereed proceedings of the 7th International Conference... Read More >>
This three-volume set, CCIS 2637-2639, constitutes the refereed proceedings of the 7th International Conference... Read More >>
This book constitutes the proceedings of the 15th International Symposium on Cyberspace Safety and Security, CSS... Read More >>
This book constitutes the refereed proceedings of the 28th International Workshop on Job Scheduling Strategies for... Read More >>
This book contains revised selected papers from the 32nd International Conference on Selected Areas in Cryptography,... Read More >>
Technological progress has made significant advances in manufacturing companies during the fourth industrial revolution.... Read More >>
This book gathers outstanding papers presented at the 6th International Conference on Data Science and Applications... Read More >>
This book constitutes the refereed proceedings of the 13th EAI International Conference on Game Theory for Networks,... Read More >>
This volume, LNCS 16349, constitutes revised selected papers from the 10th International Symposium on Algorithmic... Read More >>
This book constitutes the refereed proceedings of the 19th International Conference on Algorithmic Aspects in Information... Read More >>
The three-volume set constitutes revised selected papers of the 21st International Conference on Information Security... Read More >>
Fault tree analysis is key tool in risk analysis. It is a widely used industry standard with applications in amongst... Read More >>
commercial MPC: convolution models, transfer functions, state-space models, and constraints; Read More >>
This book covers multiple-choice questions (MCQs) related to the transfer function model applied to electrical,... Read More >>
Operational research helps in optimizing resource allocation, production processes, and logistics, while data science... Read More >>
This book is the third in a series of books dedicated to publishing extended abstracts of the activities of ICMAM... Read More >>
Feistel networks are one of the easiest ways to build pseudorandom permutations. Thanks to this property, many secret... Read More >>
Schwerpunkte bilden die Berechnung mit Symmetrischen Komponenten im Frequenzbereich nach dem klassischen Knotenpunktverfahren... Read More >>