Shortly after its inauguration in 1985 the Birla Science Centre, Hyderabad, India, started a series of lectures by Nobel ...
اقرأ المزيد
Provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet ...
اقرأ المزيد
This book is a unique compilation of experimental benchmark analyses of the accelerator-driven system (ADS) at the Kyoto ...
اقرأ المزيد
This book originates from an international summer school on biometrics, held in Alghero, Italy, in June 2003. The seven revised ...
اقرأ المزيد
In just the past five years, deep learning has taken the world by surprise, driving rapid progress in fields as diverse as ...
اقرأ المزيد
The Industrial Conference on Data Mining ICDM-Leipzig was the sixth event in a series of annual events which started in 2000. ...
اقرأ المزيد
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
اقرأ المزيد
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
اقرأ المزيد
Advances in Digital Forensics IV describes original research results and innovative applications in the emerging discipline ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 5th International Conference on Geometric Modeling and Processing, ...
اقرأ المزيد
this year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop ...
اقرأ المزيد
This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, ...
اقرأ المزيد
The papers are organized in topical sections that include material on media understanding, creative media, visual content ...
اقرأ المزيد
Security systems have become an integral part of the building and large complex setups, and intervention of the computational ...
اقرأ المزيد
Biomedical imaging is a fascinating research area to applied mathematicians. Challenging imaging problems arise and they ...
اقرأ المزيد
When information in the data warehouse is processed, it follows a definite pattern. An unexpected deviation in the data pattern ...
اقرأ المزيدThis book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions ...
اقرأ المزيد
Introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their ...
اقرأ المزيد
The 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore,during June6-9,2006.ACNS ...
اقرأ المزيد
Your immune system is unique. It is in many ways as complex as your brain, butit is not centred in one location, like the ...
اقرأ المزيد