The benefits of reading this book are twofold. The first is an understanding of the stages of a new product development process ...
اقرأ المزيد
Covering one of the most important subjects to our society today, cloud security, this editorial team delves into solutions ...
اقرأ المزيد
Discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware ...
اقرأ المزيد
Topics and features: Presents a curiosity-driven approach, posing questions to stimulate readers to design novel computational ...
اقرأ المزيد
Provides an overview of different deep learning-based methods for face recognition and related problems. Specifically, the ...
اقرأ المزيد
Constitutes the refereed post-proceedings of the First International Workshop on Deep Structure, Singularities, and Computer ...
اقرأ المزيدDeep learning has been successfully applied to solve various complex problems ranging from big data analytics to computer ...
اقرأ المزيدMachine learning and deep learning, as we know, have started ruling over almost every field in the computing industry and ...
اقرأ المزيدThe technology used to create such digital content has quickly become accessible to the masses, such as “DEEPFAKE.” Deep ...
اقرأ المزيدThe rise of large language models (LLMs) and the increasing sophistication of deepfake images have made detecting synthetic ...
اقرأ المزيدRecently, various techniques of manipulating the video content have become available to everyone – online, one can find ...
اقرأ المزيد
This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Defence Applications of Multi-Agent ...
اقرأ المزيد
In this book defense and security related applications are increasingly being tackled by researchers and practioners using ...
اقرأ المزيد
Demonstrational Optics presents a new didactical approach to the study of optics. Emphasizing the importance of elaborate ...
اقرأ المزيد
The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities ...
اقرأ المزيد
This book provides an overview of computational approaches to medical image examination and analysis in oral radiology utilizing ...
اقرأ المزيد
This volume presents the papers contributed to DEON 2006, the 8th Inter- tional Workshop on Deontic Logic in Computer Science, ...
اقرأ المزيد
This volume presents the refereed proceedings of the 9th International Conference on Deontic Logic in Computer Science, DEON ...
اقرأ المزيد
This tutorial book gives an overview of the current state of the art in measuring the different aspects of dependability ...
اقرأ المزيد
This book presented fault-tolerant algorithms, software engineering of dependable systems, networking and mobile computing, ...
اقرأ المزيد