This second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
اقرأ المزيدThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
اقرأ المزيدThe LNCS journal Transactions on Rough Sets is devoted to the entire spectrum of rough sets related issues, starting from ...
اقرأ المزيدThe LNCS journal Transactions on Rough Sets is devoted to the entire spectrum of rough sets related issues, from logical ...
اقرأ المزيدVolume IV of the Transactions on Rough Sets (TRS) introduces a number of new advances in the theory and application of rough ...
اقرأ المزيدThis book providing evidence of the continuing growth of a number of research streams. It includes articles that are extensions ...
اقرأ المزيدVolume V of the Transactions on Rough Sets (TRS) is dedicated to the monu-mental life and work of Zdzis law Pawlak1. During ...
اقرأ المزيدthis volume introduces a number of new advances in the foundations and applications of artificial intelligence, engineering, ...
اقرأ المزيدThis volume of the TRS presents papers that reflect the profound influence of a number of research initiatives by Zdzislaw ...
اقرأ المزيدThis volume of TRS presents papers that introduce a number of new - vances in the foundations and applications of arti?cial ...
اقرأ المزيدFlood damages are increasing as a result of frequent occurrence of large floods in many parts of the world, existing and ...
اقرأ المزيدThis book offers insight into important trends in the global travel and tourism industry and analyzes developments in the ...
اقرأ المزيدThis book constitutes the thoroughly refereed proceedings of the 33rd International Conference on Industrial, Engineering ...
اقرأ المزيدThis book constitutes the thoroughly refereed postproceedings of the International Workshop on Trends in Enterprise Application ...
اقرأ المزيدTopics of interest include model driven architecture, enterprise development environments, service oriented architecture, ...
اقرأ المزيدThis book is entirely about triangulations. With emphasis on computational issues, we present the basic theory necessary ...
اقرأ المزيدWhat do you do when your database application isn't running fast enough? You troubleshoot, of course. Finding the slow part ...
اقرأ المزيدThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيدThe volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
اقرأ المزيدThis book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...
اقرأ المزيد