Electronic Books

Total Books: 121 - 140 /152
Security, Privacy and Trust in Modern Data Management

In the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect ...

Weiterlesen
Signal Processing Techniques for Knowledge Extraction and Information Fusion

This state-of-the-art resource brings together the latest findings from the cross-fertilization of signal processing, machine ...

Weiterlesen
Smart Card Research and Advanced Applications

Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...

Weiterlesen
Smart Cards, Tokens, Security and Applications

This book provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the ...

Weiterlesen
Smart Sensing and Context

EuroSSC 2007 aimed to reflect two complementary viewpoints: a technology-driven viewpoint which encompasses the diversity ...

Weiterlesen
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing

The 9th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed ...

Weiterlesen
Software Technologies for Embedded and Ubiquitous Systems

This book constitutes the thoroughly refereed post-proceedings of the 5th IFIP WG 10.2 International Workshop on Software ...

Weiterlesen
Speaker Classification I

This volume and its companion volume, LNAI 4441, constitute a state-of-the-art survey for the field of speaker classification. ...

Weiterlesen
Speech and Audio Processing in Adverse Environments

The book reflects the state of the art in important areas of speech and audio signal processing. It presents topics which ...

Weiterlesen
Stabilization, Safety, and Security of Distributed Systems

This book contains the proceedings of the 8th International Symposium, SSS 2006, held in Dallas, TX, USA, November 17-19, ...

Weiterlesen
Statistical Tools for Finance and Insurance

Statistical Tools in Finance and Insurance presents ready-to-use solutions, theoretical developments and method construction ...

Weiterlesen
Stochastic Learning and Optimization

(Four areas in one book) This book covers various disciplines in learning and optimization, including perturbation analysis ...

Weiterlesen
Stochastic Theory and Control : Proceedings of a Workshop held in Lawrence, Kansas

This volume contains almost all of the papers that were presented at the Workshop on Stochastic Theory and Control that was ...

Weiterlesen
Substructuring Method for Civil Structural Health Monitoring / Shun Weng , Hongping Zhu , Yong Xia

Investigates the substructuring technology in structural health monitoring (SHM) to improve the accuracy and efficiency of ...

Weiterlesen
Technology Enhanced Learning

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Weiterlesen
The Internet of Things : First International Conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008. Proceedings

This volume contains the proceeding softhe Internet of Things (IOT)Conference 2008, the ?rst international conference of ...

Weiterlesen
The RFID Roadmap: The Next Steps for Europe

RFID is a key technology for Europe. Today we are witnessing a noticeable shift away from RFID pilot projects of the early ...

Weiterlesen
The Role of Origin of Fame in Influencer Branding: A Comparative Analysis of German and Russian Consumers

Based on a comprehensive quantitative study, Julia Sinnig shows that the impact social media influencers have on brand-related ...

Weiterlesen
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

Weiterlesen
Topics in Cryptology - CT-RSA 2008 : The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings

This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...

Weiterlesen
Total Books: 121 - 140 /152