This book offers a clear, thorough introduction to Petri nets. The explanations are supported throughout with fully integrated graphical illustrations, with only the analysis and verification presented in a formal manner.
This book proposes new ways of thinking about high-dimensional spaces using two models: the skeleton that relates the clusters to one another, and the boundaries in empty space that provide new perspectives on outliers and on outlying regions.
After an introduction to cryptography and data security, the authors of this book explain the main techniques in modern cryptography. The book is uniquely designed for students of engineering and applied computer science, and engineering practitioners.
Since the introduction of Hoares’ Communicating Sequential Process (CSP) notation, powerful new tools have transformed CSP into a practical way of describing industrial-sized problems. This book presents the basic CSP knowledge needed to utilize those tools.
This book constitutes the refereed proceedings of the 13th International Conference on Unconventional Computation and Natural Computation, UCNC 2014, held in London, ON, Canada, in July 2014. The 31 r ...
Outlining a new research direction in fuzzy set theory applied to data mining, this volume proposes a number of new data mining algorithms and includes dozens of figures and illustrations that help the reader grasp the complexities of the concepts.
This book examines trends in ubiquitous computing, assessing artificial intelligence, temporal and spatial reasoning and user-centric design methodologies along with mobile and wireless networking, group displays and context-driven adaptive presentations.