You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 30th International Conference on Advanced Information Systems Engineering, CAiSE 2018, held in Talinn, Estonia, in June 2018. The 37 papers presented in this volume were carefully reviewed and selected from 175 submissions. The papers are organized in topical sections on Process Execution, User-Oriented IS Development, Social Computing and Personalization, the Cloud and Data Services, Process Discovery, Decisions and the Blockchain, Process and Multi-level Modelling, Data Management and Visualization, Big Data and Intelligence, Data Modelling and Mining, Quality Requirements and Software, and Tutorials.
This monograph explores the design of controllers that suppress oscillations and instabilities in congested traffic flow using PDE backstepping methods. The first part of the text is concerned with basic backstepping control of freeway traffic using the Aw-Rascle-Zhang (ARZ) second-order PDE model. It begins by illustrating a basic control problem – suppressing traffic with stop-and-go oscillations downstream of ramp metering – before turning to the more challenging case for traffic upstream of ramp metering. The authors demonstrate how to design state observers for the purpose of stabilization using output-feedback control. Experimental traffic data are then used to calibrate the ARZ mo...
The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
This is a story which begins in California and ends in China. It is a detective tale with a subtle love interest. Victor Lin, a Chinese-American died in mysterious circumstances on a trip to the Thousand Island Lake south of the city of Hangzhou. His wife Anne Gavin, an Irish-American, went to China to find out what really happened. In the course of her investigation, she teamed up with David Han, an academic from Hong Kong who also lost his sister in the same "accident". As the story unfolds, the reader is treated to an exploration of the Chinese mind torn between two cultures - the native Chinese culture and the culture of the West. At one level, this is a story about corruption, obsession...
This last segment of the Sapir-Thomas Nootka texts includes three first-hand accounts of the Tlkwa:na, or Wolf Ritual, a principal ceremony of the Nuu-chah-nulth First Nations of the West Coast of Vancouver Island. The ritual, which takes several days to enact, is described in detail, from the howling of the “Wolves” in human form, to the abduction of children to their forest lair and the return of these initiates to perform newly learned dances. Also included are Sapir’s field record of a Tlkwa:na of 1910; his correspondence with his chief interpreters Alex Thomas and Frank Williams; and autobiographical stories by Alex Thomas.
The two-volume set LNCS 5761 and LNCS 5762 constitute the refereed proceedings of the 12th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2009, held in London, UK, in September 2009. Based on rigorous peer reviews, the program committee carefully selected 259 revised papers from 804 submissions for presentation in two volumes. The second volume includes 134 papers divided in topical sections on shape modelling and analysis; motion analyysis, physical based modelling and image reconstruction; neuro, cell and multiscale image analysis; image analysis and computer aided diagnosis; and image segmentation and analysis.
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.
A comprehensive study of the Hong Kong emigrants both within the context of their home society and within their new host communities. The contributers include geographers, historians, anthropologists, sociologists, psychologists, a political scientist, an educationist, an urban planner, and a sinologist. The volume is divided into seven parts: setting the scene; the historical and geographical context; Canada; Australasia; US; a European and an Asian destination (the UK and Singapore); and conclusion ("Migration from Hong Kong: Current Trends and Future Agendas"). Paper edition (432-2), $27.50. Annotation copyright by Book News, Inc., Portland, OR