The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
اقرأ المزيد
The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
اقرأ المزيد
This book subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, ...
اقرأ المزيد
Volume IV of the Transactions on Rough Sets (TRS) introduces a number of new advances in the theory and application of rough ...
اقرأ المزيد
this volume introduces a number of new advances in the foundations and applications of artificial intelligence, engineering, ...
اقرأ المزيد
This volume of the TRS presents papers that reflect the profound influence of a number of research initiatives by Zdzislaw ...
اقرأ المزيد
Translational Urinomics provides an overview of urine analysis using proteomics, metabolomics, transcriptomics or any combination ...
اقرأ المزيد
This book constitutes the thoroughly refereed proceedings of the 33rd International Conference on Industrial, Engineering ...
اقرأ المزيد
This volume addresses the demand for theories and applications of intelligent systems and computer engineering to meet the ...
اقرأ المزيدWith the rapid development of information and network technologies and market requirements, new challenges in supply chain ...
اقرأ المزيد
Written for the non-specialist seeking an authoritative but accessible overview of this interdisciplinary field, True Visions ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised ...
اقرأ المزيد
The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيد
The volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
اقرأ المزيد
This book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...
اقرأ المزيد
The book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
اقرأ المزيد
This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
اقرأ المزيد
Trusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...
اقرأ المزيد
This book presents new research on the mathematical description of tsunamis and hurricanes. The book uses the equivalence ...
اقرأ المزيد
Turbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...
اقرأ المزيد