الكتب الالكترونية

عدد الكتب: 121 - 140 /142
978-3-540-78478-4
Privacy, Security, and Trust in KDD : First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers

Vast amounts of data are collected by service providers and system administ- tors, and are available in public information ...

اقرأ المزيد
978-981-32-9088-4
Proceedings of 3rd International Conference on Computer Vision and Image Processing

This book is a collection of carefully selected works presented at the Third International Conference on Computer Vision ...

اقرأ المزيد
978-981-32-9291-8
Proceedings of 3rd International Conference on Computer Vision and Image Processing

This book is a collection of carefully selected works presented at the Third International Conference on Computer Vision ...

اقرأ المزيد
978-3-540-68164-9
Progress in Cryptology - AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings

The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...

اقرأ المزيد
978-3-540-89754-5
Progress in Cryptology - INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...

اقرأ المزيد
978-3-540-85920-8
Progress in Pattern Recognition, Image Analysis and Applications : 13th Iberoamerican Congress on Pattern Recognition, CIARP 2008, Havana, Cuba, September 9-12, 2008. Proceedings

This book is organized in topical sections on signal analysis for characterization and filtering, analysis of shape and texture, ...

اقرأ المزيد
978-3-540-87403-4
Recent Advances in Intrusion Detection : 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings

This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...

اقرأ المزيد
978-0-387-38464-1
Reliable Face Recognition Methods

This book seeks to comprehensively address the face recognition problem while gaining new insights from complementary fields ...

اقرأ المزيد
978-3-540-72458-2
Rough Sets and Knowledge Technology

Constitutes proceedings of the Second International Conference on Rough Sets and Knowledge Technology, RSKT 2007, held in ...

اقرأ المزيد
978-1-4020-6662-7
Safeguards in a World of Ambient Intelligence

It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...

اقرأ المزيد
978-0-387-69933-2
Securing Biometrics Applications

Biometrics is becoming increasingly common in establishments that require high security such as state security and financial ...

اقرأ المزيد
978-1-84628-984-2
Security with Noisy Data

Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...

اقرأ المزيد
978-3-540-85893-5
Smart Card Research and Advanced Applications : 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings

This book deals with the various issues related to the use of small electronic tokens in the process of human-machine interactions. ...

اقرأ المزيد
978-3-540-88793-5
Smart Sensing and Context : Third European Conference, EuroSSC 2008, Zurich, Switzerland, October 29-31, 2008. Proceedings

This book is organized in topical sections on smart objects, spatial and human context inference, context processing and ...

اقرأ المزيد
978-3-540-36678-2
SmartKom: Foundations of Multimodal Dialogue Systems

With contributions by leading scientists in the field, this book gives the first comprehensive overview of the results of ...

اقرأ المزيد
978-3-540-74122-0
Speaker Classification II

This two volume set, LNAI 4343 and LNAI 4441, constitutes a state-of-the-art survey for the field of speaker classification. ...

اقرأ المزيد
978-0-387-35209-1
Statistical Methods in Counterterrorism

All the data was out there to warn us of this impending attack, why didn't we see it?" This was a frequently asked question ...

اقرأ المزيد
978-0-387-44970-8
Statistical Monitoring of Clinical Trials

This book shows that the joint distribution of the test statistics at different analysis times is asymptotically multivariate ...

اقرأ المزيد
978-3-540-37241-7
Structural, Syntactic, and Statistical Pattern Recognition

This book constitutes the refereed proceedings of the 11th International Workshop on Structural and Syntactic Pattern Recognition, ...

اقرأ المزيد
978-3-540-89689-0
Structural, Syntactic, and Statistical Pattern Recognition : Joint IAPR International Workshop, SSPR & SPR 2008, Orlando, USA, December 4-6, 2008. Proceedings

This book includes : graph-based methods, probabilistic and stochastic structural models for PR, image and video analysis, ...

اقرأ المزيد
عدد الكتب: 121 - 140 /142