Listing 1 - 3 of 3 |
Sort by
|
Choose an application
The first part of the book provides a pedagogical introduction to the physics of complex systems driven far from equilibrium. In this part we discuss the basic concepts and theoretical techniques which are commonly used to study classical stochastic transport in systems of interacting driven particles. The analytical techniques include mean-field theories, matrix product ansatz, renormalization group, etc. and the numerical methods are mostly based on computer simulations. In the second part of the book these concepts and techniques are applied not only to vehicular traffic but also to transpo
Stochastic processes. --- Transport theory. --- Boltzmann transport equation --- Transport phenomena --- Mathematical physics --- Particles (Nuclear physics) --- Radiation --- Statistical mechanics --- Random processes --- Probabilities --- Stochastic processes --- Transport theory
Choose an application
Choose an application
This book constitutes the proceedings of the 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, held in Como, Italy, in September 2018. The 47 full papers presented in this volume were carefully reviewed and selected from 64 submissions. This volume contains invited contributions and accepted papers from the main track and from the three organized workshops. The volume is organized in the following topics: biological systems modeling; simulation and other applications of CA; multi-agent systems; pedestrian and traffic dynamics; synchronization and control; theory and cryptography; asynchronous cellular automata; and crowds, traffic and cellular automata.
Artificial intelligence. --- Software engineering. --- Computer Communication Networks. --- Computer security. --- Data encryption (Computer science). --- Artificial Intelligence. --- Special Purpose and Application-Based Systems. --- Systems and Data Security. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer software engineering --- Engineering --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Protection --- Security measures --- Cellular automata --- Special purpose computers. --- Computer communication systems. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Special purpose computers --- Distributed processing --- Computers, Special purpose. --- Computer networks. --- Data protection. --- Cryptography. --- Data and Information Security. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data
Listing 1 - 3 of 3 |
Sort by
|