Providing an introduction to some classical and recent results and techniques in projective algebraic geometry, this monograph treats the geometrical properties of varieties embedded in
This book constitutes the thoroughly refereed post proceedings of the 11th EAI International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2015, held
This volume constitutes the thoroughly refereed post-conference proceedings of the 11th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2015, held in Dallas,
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on E-Learning, E-Education, and Online Training, eLEOT 2015, held in Novedrate, Italy,
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Mobile Computing, Applications, and Services (MobiCASE 2015) held in Berlin, Germany, i
In this set of lecture notes, the author includes some of the latest research on the theory of Morrey Spaces associated with Harmonic Analysis. There are three main claims concerning these space
This book constitutes the proceedings of the First International Conference on Future Access Enablers for Ubiquitous and Intelligent Infrastructures, FABULOUS 2015, held in Ohrid, Republic of Macedoni
This book constitutes the refereed proceedings of the 7th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2015, held in Seoul, South Korea, in October 2015. The 14 papers and 3 a
This book deals with optimization methods as tools for decision making and control in the presence of uncertainty. It is oriented to the use of these tools in engineering and, specifically, in automat
This book constitutes the proceedings of the 7th International Conference on Wireless and Satellite Services, WiSATS 2015, held in Bradford, UK, in July 2015. The conference was formerly known as the
This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beiji
This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beiji
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Ad Hoc Networks, ADHOCNETS 2015, held in September 2015 in Italy.The 17 regular and 3 invit
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2015, held in Doha, Qatar, in Apr
In these notes we consider two kinds of nonlinear evolution problems of von Karman type on Euclidean spaces of arbitrary even dimension. Each of these problems consists of a system that results from t
This book is devoted to Control System Technology applied to aerospace and covers the four disciplines Cognitive Engineering, Computer Science, Operations Research, and Servo-Mechanisms. This edited b
This book provides readers with alternative robust approaches to control design for an important class of systems characteristically associated with ocean-going vessels and structures. These systems,
This treatment of modern topics related to mathematical systems theory forms the proceedings of a workshop, Mathematical Systems Theory: From Behaviors to Nonlinear Control, held at the University of
This treatment of modern topics related to mathematical systems theory forms the proceedings of a workshop, Mathematical Systems Theory: From Behaviors to Nonlinear Control, held at the University of
The two-volume set LNICST 150 and 151 constitutes the thoroughly refereed post-conference proceedings of the First International Internet of Things Summit, IoT360 2014, held in Rome, Italy, in October
The two-volume set LNICST 150 and 151 constitutes the thoroughly refereed post-conference proceedings of the First International Internet of Things Summit, IoT360 2014, held in Rome, Italy, in October
This monograph presents a systematic top-down approach to distributed control synthesis of discrete-event systems (DES). The approach is called supervisor localization; its essence is the allocation o
This book provides a systematic presentation of the principles and practices behind the synthesis and functionalization of graphene and grapheme oxide (GO), as well as the fabrication techniques for t
This book constitutes the thoroughly refereed proceedings of the Fourth International Conference on Arts and Technology, ArtsIT 2014, held in Istanbul, Turkey, in November 2014. The 17 revised full pa
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Wireless Internet, WICON 2014, held in Lisbon, Portugal, in November 2014. The 45 revis
This volume studies electron resonant tunneling in two- and three-dimensional quantum waveguides of variable cross-sections in the time-independent approach.Mathematical models are suggested for the r
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Sensor Systems and Software, S-Cube 2014, held in Coventry, UK, in October 2014.The 9 r
This book constitutes the thoroughly refereed proceedings of the 6th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2014, held in Kampala, Uganda, Novem
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Scalable Information Systems, INFOSCALE 2014, held in September 2014 in Seoul, South Korea.
This concise book illustrates the deep roots of the geometrically nonlinear kinematics of generalized continuum mechanics in differential geometry. Besides applications to first-order elasticity and e
This book constitutes the thoroughly refereed post conference proceedings of the 5th International Conference on Cloud Computing, CloudComp 2014, held in Guilin, China, in October 2014.The 25 revised
This book constitutes the thoroughly refereed proceedings of the 15th International Workshop on Information Security Applications, WISA 2014, held on Jeju Island, Korea, in August 2014. The 30 revised
This book constitutes the post-proceedings of the 6th International ICST Conference on Mobile Networks and Management, MONAMI 2014, held in Wurzburg, Germany, in September 2014.The 22 revised full pap
This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Milan, Italy, in March 2015. The 11 full papers presen
This book constitutes the thoroughly refereed post-conference proceedings of the International Conference on Nature of Computation and Communication, ICTCC 2014, held in November 2014 in Ho Chi Minh C
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Security (FC 2014), held in Christ Church, Barbados, i
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2013, held in September 2013 in Moscow,
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, h
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, h
This monograph provides a rigorous treatment of problems related to partial asymptotic stability and controllability for models of flexible structures described by coupled nonlinear ordinary and parti