The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
اقرأ المزيدThis inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
اقرأ المزيدThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
اقرأ المزيدTransactions on HiPEAC is a new journal which aims at the timely dissemination of research contributions in computer architecture ...
اقرأ المزيدInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
اقرأ المزيدThis volume addresses the demand for theories and applications of intelligent systems and computer engineering to meet the ...
اقرأ المزيدTrend in Neural Computation includes twenty chapters either contributed from leading experts or formed by extending well ...
اقرأ المزيدThis book is entirely about triangulations. With emphasis on computational issues, we present the basic theory necessary ...
اقرأ المزيدThis book constitutes the thoroughly refereed post-proceedings of the Second Symposium on Trustworthy Global Computing, TGC ...
اقرأ المزيدA major focus of Turbo-like Codes is on high speed turbo decoding, which targets applications with data rates of several ...
اقرأ المزيدThe primary purpose of TUTORIALS ON EMERGING METHODOLOGIES AND APPLICATIONS IN OPERATIONS RESEARCH is to provide a reference ...
اقرأ المزيدThis book describes new methods for building intelligent systems using type-2 fuzzy logic and soft computing techniques. ...
اقرأ المزيدThe 7th International Conference on Typed Lambda Calculi and Applications (TLCA 2005) was held in Nara (Japan) from 21 to ...
اقرأ المزيدThe refereed post-proceedings of the International Workshop of the Types Working Group are presented in this volume. The ...
اقرأ المزيدThe topic of this book was formal reasoning and computer programming based on type theory. Great importance was attached ...
اقرأ المزيدOver recent years most business processes have changed in various dimensions (e. g. , ?exibility, interconnectivity, coordination ...
اقرأ المزيدThis volume provides a comprehensive view of unconstrained face recognition, especially face recognition from multiple still ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Sixth International Conference on Unconventional Computation, UC 2007,organized ...
اقرأ المزيدThe Fourth International Conference on Unconventional Computation, UC 2005, organized under the auspices of EATCS by the ...
اقرأ المزيدThis book about The 5th International Conference on Unconventional Computation, UC 2006,organized under the auspices of the ...
اقرأ المزيد