You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 9th Asia-Pacific Computer Systems Architecture Conference, ACSAC 2004, held in Beijing, China in September 2004. The 45 revised full papers presented were carefully reviewed and selected from 154 submissions. The papers are organized in topical sections on cache and memory, reconfigurable and embedded architectures, processor architecture and design, power and energy management, compiler and operating systems issues, application-specific systems, interconnection networks, prediction techniques, parallel architectures and programming, microarchitecture design and evaluation, memory and I/O systems, and others.
During the last decade, novel graphene related materials (GRMs), perovskites, as well as metal oxides and other metal nanostructures have received the interest of the scientific community. Due to their extraordinary physical, optical, thermal, and electrical properties, which are correlated with their 2D ultrathin atomic layer structure, large interlayer distance, ease of functionalization, and bandgap tunability, these nanomaterials have been applied in the development or the improvement of innovative optoelectronic applications, as well as the expansion of theoretical studies and simulations in the fast-growing fields of energy (photovoltaics, energy storage, fuel cells, hydrogen storage, ...
This three-volume set LNCS 13338-13340 constitutes the thoroughly refereed proceedings of the 8th International Conference on Artificial Intelligence and Security, ICAIS 2022, which was held in Qinghai, China, in July 2022. The total of 166 papers included in the 3 volumes were carefully reviewed and selected from 1124 submissions. The papers present research, development, and applications in the fields of artificial intelligence and information security
With the rapid development of Web-based learning and new concepts like virtual cla- rooms, virtual laboratories and virtual universities, many issues need to be addressed. On the technical side, there is a need for effective technology for deployment of W- based education.On the learning side, the cyber mode of learning is very different from classroom-based learning. How can instructional developmentcope with this new style of learning? On the management side, the establishment of the cyber university - poses very different requirements for the set-up. Does industry-university partnership provide a solution to addressing the technological and management issues? Why do we need to standardize...
This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.
This three-volume set of LNCS 14086, LNCS 14087 and LNCS 14088 constitutes - in conjunction with the double-volume set LNAI 14089-14090- the refereed proceedings of the 19th International Conference on Intelligent Computing, ICIC 2023, held in Zhengzhou, China, in August 2023. The 337 full papers of the three proceedings volumes were carefully reviewed and selected from 828 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was "Advanced Intelligent Computing Technology and Applications". Papers that focused on this theme were solicited, addressing theories, methodologies, and applications in science and technology.
This book provides a wealth of new information, ideas and analysis on some of the key unknowns in hurricane research. Topics covered include the numerical prediction systems for tropical cyclone development, the use of remote sensing methods for tropical cyclone development, a parametric surface wind model for tropical cyclones, a micrometeorological analysis of the wind as a hurricane passes over Houston, USA, the meteorological passage of numerous tropical cyclones as they pass over the South China Sea, simulation modelling of evacuations by motorised vehicles in Alabama, the influence of high stream-flow events on nutrient flows in the post hurricane period, a reviews of the medical needs, both physical and psychological of children in a post hurricane scenario and finally the impact of two hurricanes on Ireland. Hurricanes discussed in the various chapters include Katrina, Ike, Isidore, Humberto, Debbie and Charley and many others in the North Atlantic as well as numerous tropical cyclones in the South China Sea.