Electronic Books

Total Books: 41 - 60 /191
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Weiterlesen
Computer Vision - ECCV 2008 : 10th European Conference on Computer Vision, Marseille, France, October 12-18, 2008, Proceedings, Part I

The four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...

Weiterlesen
Computer Vision - ECCV 2008 : 10th European Conference on Computer Vision, Marseille, France, October 12-18, 2008, Proceedings, Part II

The four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...

Weiterlesen
Computer Vision - ECCV 2008 : 10th European Conference on Computer Vision, Marseille, France, October 12-18, 2008, Proceedings, Part III

The four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...

Weiterlesen
Computer Vision - ECCV 2008 : 10th European Conference on Computer Vision, Marseille, France, October 12-18, 2008, Proceedings, Part IV

The four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...

Weiterlesen
Computer Vision : Algorithms and Applications / Richard Szeliski

Explores the variety of techniques used to analyze and interpret images. It also describes challenging real-world applications ...

Weiterlesen
Coordinated Multiuser Communications

Many communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access ...

Weiterlesen
NoIMG
Cybersecurity of Digital Service Chains : Challenges, Methodologies, and Tools

This book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current ...

Weiterlesen
Cyberspace Security and Defense: Research Issues

The development of Internet, mobile communications, distributed computing, computer software and databases storing essential ...

Weiterlesen
Deep Learning-Based Face Analytics / Nalini K Ratha, Dr. Vishal M. Patel

Provides an overview of different deep learning-based methods for face recognition and related problems. Specifically, the ...

Weiterlesen
NoIMG
Deep fake detection / Malek Sharaf Al-Deen ; Ali Issa ; Abdullah Tellawi ; Ahmad Jamal Al-Deen

Deep learning has been successfully applied to solve various complex problems ranging from big data analytics to computer ...

Weiterlesen
NoIMG
Deepfake detection / Abdelrahman Al-Asha , John Al-Nemeh , Philip Elias and Mhd Tysser Al-Mallah ; Supervised by Raouf Hamdan and Khloud Al-Jallad عبد الرحمن العشا ، جون النعمة ، فيليب اميران الياس و محمد تيسير الملاح ؛ إشراف رؤوف حمدان و خلود الجلاد

The rise of large language models (LLMs) and the increasing sophistication of deepfake images have made detecting synthetic ...

Weiterlesen
Detection of Intrusions and Malware, and Vulnerability Assessment

This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response

Weiterlesen
Detection of Intrusions and Malware, and Vulnerability Assessment

This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response

Weiterlesen
Detection of Intrusions and Malware, and Vulnerability Assessment

This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...

Weiterlesen
Detection of Intrusions and Malware, and Vulnerability Assessment : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings

This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...

Weiterlesen
Detection of Intrusions and Malware, and Vulnerability Assessment : 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...

Weiterlesen
NoIMG
Developing bus management system for AIU محمد وسيم أويس العجلاني ؛ نجود عبدالله السالم ؛ دانة غسان الغميان ؛ رغد خليفة ؛ إشراف د.سيرا استور

To solve the problem of congestion in bus stops for students, members of the administrative and educational people at the ...

Weiterlesen
NoIMG
Development of breast cancer therapy and gender / Deema Darkal ; Bayan Aboulebadeh ; Hasnaa Qutait

Breast cancer is a disease in which abnormal cells in the breast tissues multiply and form an invasive (or malignant) tumor. ...

Weiterlesen
Distributed Computing and Internet Technology (vol. # 4317)

Constitutes the refereed proceedings of the Third International Conference on Distributed Computing and Internet Technology, ...

Weiterlesen
Total Books: 41 - 60 /191