The sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...
اقرأ المزيد
Describes the development of quality over various stages, from product inspection, through quality control to the present ...
اقرأ المزيد
Functions which are defined on finite sets occur in almost all fields of mathematics. For more than 80 years algebras whose ...
اقرأ المزيد
Functions which are defined on finite sets occur in almost all fields of mathematics. For more than 80 years algebras whose ...
اقرأ المزيدSynthesizing high-quality images from text descriptions is a challenging problem in computer vision and has many practical ...
اقرأ المزيد
The international Gesture Workshops have become the leading interdisciplinary events for dissemination of the latest results ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 15th International Conference on Green, Pervasive, and Cloud Computing, ...
اقرأ المزيد
This Open Access handbook published at the IAMG's 50th anniversary, presents a compilation of invited path-breaking research ...
اقرأ المزيد
Heterogeneous Wireless Access Networks provides a unified view of the state-of-the-art protocols and architectures for heterogeneous ...
اقرأ المزيد
This is the first and most comprehensive book perts to give their opinion and interpretation of dedicated to the understanding ...
اقرأ المزيد
This book is the first to deal specifically with hidradenitis suppurativa, a common but little-known condition. Many patients ...
اقرأ المزيد
Constitutes the refereed proceedings of the 8th IEEE Workshop on IP Operations and Management, IPOM 2008, held on Samos Island, ...
اقرأ المزيد
This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...
اقرأ المزيد
th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, ...
اقرأ المزيد
his volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference ...
اقرأ المزيد
The 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...
اقرأ المزيد
Constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 8th International Workshop on Intelligent Virtual Agents, IVA 2008, ...
اقرأ المزيد
A conference organized by the Berlin-based Republikanischer Anwältinnen- und Anwälteverein (Republican Lawyers As- ciation) ...
اقرأ المزيد