الكتب الالكترونية

عدد الكتب: 121 - 140 /224
978-3-540-69812-8
Image Analysis and Recognition : 5th International Conference, ICIAR 2008, Póvoa de Varzim, Portugal, June 25-27, 2008. Proceedings

The 110 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 226 submissions. ...

اقرأ المزيد
978-3-540-69905-7
Image and Signal Processing : 3rd International Conference, ICISP 2008. Cherbourg-Octeville, France, July 1 - 3, 2008. Proceedings

This book constitutes the refereed proceedings of the Third International Conference on Image and Signal Processing, ICISP ...

اقرأ المزيد
978-0-387-28982-3
Inference in Hidden Markov Models

This book is a comprehensive treatment of inference for hidden Markov models, including both algorithms and statistical theory. ...

اقرأ المزيد
978-3-540-77535-5
Information Security Applications

Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...

اقرأ المزيد
978-3-540-33355-5
Information Security and Cryptology - ICISC 2005

This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...

اقرأ المزيد
978-3-540-49114-9
Information Security and Cryptology – ICISC 2006

This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...

اقرأ المزيد
978-3-540-73458-1
Information Security and Privacy

The book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...

اقرأ المزيد
978-3-540-70500-0
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

اقرأ المزيد
978-3-7908-2026-3
Innovation and Firm Performance

The process of firms’ growth – in terms of productivity or employment – is a major concern of policy makers. In this ...

اقرأ المزيد
978-3-540-32063-0
Intelligence and Security Informatics (vol. # 3495)

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...

اقرأ المزيد
978-3-540-33362-3
Intelligence and Security Informatics (vol. # 3917)

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...

اقرأ المزيد
978-3-540-34479-7
Intelligence and Security Informatics (vol. # 3975)

In the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development ...

اقرأ المزيد
978-3-540-89900-6
Intelligence and Security Informatics : First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings

This book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, ...

اقرأ المزيد
978-3-030-80119-9
Intelligent Computing ; Proceedings of the 2021 Computing Conference, Volume 1

This book is a comprehensive collection of chapters focusing on the core areas of computing and their further applications ...

اقرأ المزيد
978-3-540-73291-4
Introduction to Modern Time Series Analysis

This excellent textbook presents an introduction to the time series analysis. It provides a good source of information for ...

اقرأ المزيد
978-3-540-74771-0
Life System Modeling and Simulation

The International Conference on Life System Modeling and Simulation (LSMS) was formed to bring together international researchers ...

اقرأ المزيد
978-3-540-74227-2
Linear Models and Generalizations: Least Squares and Alternatives

Thebookisbasedonseveralyearsofexperienceofbothauthorsinteaching linear models at various levels. It gives an up-to-date account ...

اقرأ المزيد
978-0-387-49771-6
Linking and Aligning Scores and Scales

In this book, experts in statistics and psychometrics describe classes of linkages, the history of score linkings, data collection ...

اقرأ المزيد
978-1-4020-4140-2
Low-Power Low-Voltage Sigma-Delta Modulators in Nanometer CMOS

At the system level, a novel systematic study on the full feedforward Sigma-Delta topology is presented in this book. As ...

اقرأ المزيد
978-981-15-1706-8
Machine Learning Approaches in Cyber Security Analytics

This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being ...

اقرأ المزيد
عدد الكتب: 121 - 140 /224