Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
اقرأ المزيدDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
اقرأ المزيدThis volume contains a subset of the papers presented at the 10th Panhellenic Conference in Informatics (PCI 2005), which ...
اقرأ المزيدSimple tutorial chapters introduce the reader to cutting edge technologies, such as parallel and distributed computing, object-oriented ...
اقرأ المزيدMachine learning and cybernetics play an important role in many modern electronic, computer and communications systems. Automated ...
اقرأ المزيدThis Volume presents the most exciting results of the Mobile and Wireless Communication Summit, held 2007 in Budapest. It ...
اقرأ المزيدThe two volume set LNCS 4351 and LNCS 4352 constitutes the refereed proceedings of the 13th International Multimedia Modeling ...
اقرأ المزيدThis volume comprises the communications presented at the ETC 11, the EUROMECH European Turbulence Conference held in 2007 ...
اقرأ المزيدIn 2005, two AOIS workshops were held internationally. The first was affiliated with the AAMAS 2005 meeting in July in Utrecht ...
اقرأ المزيدDiscusses existing conventional radio frequency (RF)-based wireless access technology and presents the challenges that can ...
اقرأ المزيدPoint processes and random measures find wide applicability in telecommunications, earthquakes, image analysis, spatial point ...
اقرأ المزيدThis book covers the analysis and design of nonlinear analog integrated circuits that form the basis of present-day communication ...
اقرأ المزيدIntended for anyone who has an interest to learn the analysis and design of analog and digital systems. The book covers the ...
اقرأ المزيدAnalysis of Computer and Communication Networks presents the academic and research communities with mathematical theory and ...
اقرأ المزيدThis book constitutes the refereed joint proceedings of seven workshops on evolutionary computing, EvoWorkshops 2006, held ...
اقرأ المزيدThe 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ...
اقرأ المزيدIn The Uses of Argument Stephen Toulmin proposed a new model for the layout of arguments, with six components: claim, data, ...
اقرأ المزيدThe purpose of this book is to give an up-to date view of the scientific production in the fields of Agent-based Computational ...
اقرأ المزيدDiscusses the future possibilities of AI with cloud computing and edge computing. Aims to conduct analyses, implementation ...
اقرأ المزيدDiscusses the evolution of future generation technologies through Internet of Things (IoT) in the scope of Artificial Intelligence ...
اقرأ المزيد