Electronic Books

Total Books: 121 - 140 /224
Image Analysis and Recognition : 5th International Conference, ICIAR 2008, Póvoa de Varzim, Portugal, June 25-27, 2008. Proceedings

The 110 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 226 submissions. ...

Weiterlesen
Image and Signal Processing : 3rd International Conference, ICISP 2008. Cherbourg-Octeville, France, July 1 - 3, 2008. Proceedings

This book constitutes the refereed proceedings of the Third International Conference on Image and Signal Processing, ICISP ...

Weiterlesen
Inference in Hidden Markov Models

This book is a comprehensive treatment of inference for hidden Markov models, including both algorithms and statistical theory. ...

Weiterlesen
Information Security Applications

Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...

Weiterlesen
Information Security and Cryptology - ICISC 2005

This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...

Weiterlesen
Information Security and Cryptology – ICISC 2006

This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...

Weiterlesen
Information Security and Privacy

The book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...

Weiterlesen
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

Weiterlesen
Innovation and Firm Performance

The process of firms’ growth – in terms of productivity or employment – is a major concern of policy makers. In this ...

Weiterlesen
Intelligence and Security Informatics (vol. # 3495)

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...

Weiterlesen
Intelligence and Security Informatics (vol. # 3917)

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...

Weiterlesen
Intelligence and Security Informatics (vol. # 3975)

In the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development ...

Weiterlesen
Intelligence and Security Informatics : First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings

This book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, ...

Weiterlesen
Intelligent Computing ; Proceedings of the 2021 Computing Conference, Volume 1

This book is a comprehensive collection of chapters focusing on the core areas of computing and their further applications ...

Weiterlesen
Introduction to Modern Time Series Analysis

This excellent textbook presents an introduction to the time series analysis. It provides a good source of information for ...

Weiterlesen
Life System Modeling and Simulation

The International Conference on Life System Modeling and Simulation (LSMS) was formed to bring together international researchers ...

Weiterlesen
Linear Models and Generalizations: Least Squares and Alternatives

Thebookisbasedonseveralyearsofexperienceofbothauthorsinteaching linear models at various levels. It gives an up-to-date account ...

Weiterlesen
Linking and Aligning Scores and Scales

In this book, experts in statistics and psychometrics describe classes of linkages, the history of score linkings, data collection ...

Weiterlesen
Low-Power Low-Voltage Sigma-Delta Modulators in Nanometer CMOS

At the system level, a novel systematic study on the full feedforward Sigma-Delta topology is presented in this book. As ...

Weiterlesen
Machine Learning Approaches in Cyber Security Analytics

This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being ...

Weiterlesen
Total Books: 121 - 140 /224