FitBuddy App is a sports application that employs artificial intelligence in its job as a personal trainer that enables users ...
اقرأ المزيد
In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
اقرأ المزيد
In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
اقرأ المزيد
In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...
اقرأ المزيد
The expert witness’ job is often described as a balancing act: duty to clients on the one hand, duty to society on the ...
اقرأ المزيد
Many would–be software entrepreneurs with expertise in many fields attempt to turn a homegrown application—one developed ...
اقرأ المزيد
Application documents recent approaches and results presented at the International Embedded Systems Symposium (IESS 2005), ...
اقرأ المزيد
This book constitutes the thoroughly refereed research papers contributed to a research project on the `General Theory of ...
اقرأ المزيد
Generative Programming and Component Engineering (GPCE) is a leading - searchconferenceonautomaticprogrammingandcomponentengineering.These ...
اقرأ المزيد
The volume focuses on public policy issues related to physician-assisted suicide. It offers a detailed analysis of the current ...
اقرأ المزيد
Begins with an overview of the technology landscape behind BERT. It takes you through the basics of NLP, including natural ...
اقرأ المزيدOur project aims to aid deaf-mute people by tracking hand movements of the deaf-mute person for word level American Sign ...
اقرأ المزيد
The book promotes development scalability through domain partitioning and subdomain partitioning. It also explores software ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...
اقرأ المزيد
This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...
اقرأ المزيد
All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, ...
اقرأ المزيد
th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, ...
اقرأ المزيد
Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...
اقرأ المزيد
The 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...
اقرأ المزيد
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory ...
اقرأ المزيد