default search action
Search dblp for Publications
export results for "stream:series/sece:"
@book{DBLP:series/sece/Engelberg15, author = {Shlomo Engelberg}, title = {A Mathematical Introduction to Control Theory - 2\({}^{\mbox{nd}}\) Edition}, series = {Series in Electrical and Computer Engineering}, volume = {4}, publisher = {WorldScientific}, year = {2015}, url = {https://doi.org/10.1142/p1031}, doi = {10.1142/P1031}, isbn = {978-1-78326-779-8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sece/Engelberg15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sece/YuT11, author = {Zhenwei Yu and Jeffrey J. P. Tsai}, title = {Intrusion Detection - {A} Machine Learning Approach}, series = {Series in Electrical and Computer Engineering}, volume = {3}, publisher = {WorldScientific}, year = {2011}, url = {https://doi.org/10.1142/p666}, doi = {10.1142/P666}, isbn = {978-1-84816-447-5}, timestamp = {Wed, 28 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sece/YuT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sece/ChowC07, author = {Tommy W. S. Chow and Siu{-}Yeung Cho}, title = {Neural Networks and Computing - Learning Algorithms and Applications}, series = {Series in Electrical and Computer Engineering}, volume = {7}, publisher = {WorldScientific}, year = {2007}, url = {https://doi.org/10.1142/p487}, doi = {10.1142/P487}, isbn = {978-1-86094-758-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sece/ChowC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sece/LuZRW07, author = {Jie Lu and Guangquan Zhang and Da Ruan and Fengjie Wu}, title = {Multi-Objective Group Decision Making - Methods, Software and Applications with Fuzzy Set Techniques(With {CD-ROM)}}, series = {Series in Electrical and Computer Engineering}, volume = {6}, publisher = {WorldScientific}, year = {2007}, url = {https://doi.org/10.1142/p505}, doi = {10.1142/P505}, isbn = {978-1-86094-793-3}, timestamp = {Fri, 19 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/sece/LuZRW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sece/MaT06, author = {Lu Ma and Jeffrey J. P. Tsai}, title = {Security Modeling and Analysis of Mobile Agent Systems}, series = {Series in Electrical and Computer Engineering}, volume = {5}, publisher = {WorldScientific}, year = {2006}, url = {https://doi.org/10.1142/p435}, doi = {10.1142/P435}, isbn = {978-1-86094-634-9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sece/MaT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sece/Engelberg05, author = {Shlomo Engelberg}, title = {A Mathematical Introduction to Control Theory}, series = {Series in Electrical and Computer Engineering}, volume = {2}, publisher = {WorldScientific}, year = {2005}, url = {https://doi.org/10.1142/p396}, doi = {10.1142/P396}, isbn = {978-1-86094-570-0}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sece/Engelberg05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sece/Chen03, author = {Wai{-}Kai Chen}, title = {Net Theory and Its Applications - Flows in Networks}, series = {Series in Electrical and Computer Engineering}, volume = {1}, publisher = {WorldScientific}, year = {2003}, url = {https://doi.org/10.1142/p193}, doi = {10.1142/P193}, isbn = {978-1-86094-226-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sece/Chen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.