الكتب الالكترونية

عدد الكتب: 1 - 19 /19
978-3-540-89796-5
Advances in Multimedia Information Processing - PCM 2008 : 9th Pacific Rim Conference on Multimedia, Tainan, Taiwan, December 9-13, 2008. Proceedings

This book constitutes the refereed proceedings of the 9th Pacific Rim Conference on Multimedia, PCM 2008, held in Tainan, ...

اقرأ المزيد
978-3-540-87361-7
Algorithms in Bioinformatics : 8th International Workshop, WABI 2008, Karlsruhe, Germany, September 15-19, 2008. Proceedings

This book constitutes the refereed proceedings of the 8th International Workshop on Algorithms in Bioinformatics, WABI 2008, ...

اقرأ المزيد
978-3-540-27903-7
Design and Analysis of Randomized Algorithms

Randomness is a powerful phenomenon that can be harnessed to solve various problems in all areas of computer science. Randomized ...

اقرأ المزيد
978-3-540-35999-9
Digital Rights Management

The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...

اقرأ المزيد
978-3-540-48827-9
Digital Watermarking (vol. # 4283)

IWDW 2006 was held on Jeju, the dream island in Korea. The main theme of the workshop was “Meet the Challenges in this ...

اقرأ المزيد
978-3-540-92238-4
Digital Watermarking : 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedings

This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in ...

اقرأ المزيد
978-3-540-77370-2
Information Hiding

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...

اقرأ المزيد
978-3-540-74124-4
Information Hiding

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...

اقرأ المزيد
978-3-540-30114-1
Information Hiding

All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, ...

اقرأ المزيد
978-3-540-31481-3
Information Hiding (vol. # 3727)

Constitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...

اقرأ المزيد
978-3-540-88961-8
Information Hiding : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...

اقرأ المزيد
978-3-540-49610-6
Information Security and Cryptology (vol. # 4318)

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...

اقرأ المزيد
978-3-540-32422-5
Information Systems Security (vol. # 3803)

The 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19–21, 2005 at Jadavpur ...

اقرأ المزيد
978-3-540-85093-9
Information Theoretic Security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings

This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...

اقرأ المزيد
978-1-4020-8571-0
Integrated Management of Diseases Caused by Fungi, Phytoplasma and Bacteria

This book is about stone fruit and apple diseases, grapevine and fruit crops phytoplasma, Phytophthora on citrus, chestnut ...

اقرأ المزيد
978-3-540-29449-8
Nucleic Acids and Proteins in Soil

With millions of different bacterial species living in soil, the microbial community is extremely complex, varying at very ...

اقرأ المزيد
978-3-540-47870-6
Security and Privacy in Digital Rights Management

This book about the ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with ...

اقرأ المزيد
978-3-540-49072-2
Transactions on Data Hiding and Multimedia Security I

This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...

اقرأ المزيد
978-3-540-73092-7
Transactions on Data Hiding and Multimedia Security II

This second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...

اقرأ المزيد
عدد الكتب: 1 - 19 /19