This book constitutes the refereed proceedings of the Third International Conference on Image and Signal Processing, ICISP ...
اقرأ المزيد
The aim of this Volume of scientific essays is twofold. From one side, by remembering the scientific figure of Eduardo R. ...
اقرأ المزيد
The 12th International Conference on Implementation and Application of - tomata CIAA 2007 washeld at the Czech Technical ...
اقرأ المزيد
This volume of Lecture Notes in Computer Science contains the revised versions of the papers presented at the 9th International ...
اقرأ المزيد
This volume of the Lecture Notes in Computer Science series contains the notes of the two invited lectures, the 26 papers ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 11th International Conference on Implementation and Application of ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-proceedings of the 13th International Conference on Implementation and ...
اقرأ المزيد
Inconsistency arises in many areas in advanced computing. Often inconsistency is unwanted, for example in the specification ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-proceedings of the 16th International Conference on Inductive Logic Programming, ...
اقرأ المزيد
The 18th International Conference on Inductive Logic Programming was held in Prague, September 10–12, 2008. ILP returned ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 18th International Conference on Inductive Logic Programming, ILP 2008, ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-conference proceedings of the 4th Asia Information Retrieval Symposium, ...
اقرأ المزيد
The 10th Information Security Conference (ISC 2007) was held in Valpara´ ?so, Chile, October 9–12, 2007. ISC is an annual ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS ...
اقرأ المزيد
This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...
اقرأ المزيد