Computer recognition systems are nowadays one of the most promising directions in artificial intelligence. This book presents ...
WeiterlesenThis book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, ...
WeiterlesenIt' s important to improving the state of the art of highly depe- able computer-based systems, since then increasingly applied ...
WeiterlesenIt' s important to improving the state of the art of highly depe- able computer-based systems, since then increasingly applied ...
WeiterlesenThis book constitutes the refereed proceedings of the 24th International Conference on Computer Safety, Reliability, and ...
WeiterlesenThe conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability ...
WeiterlesenThis book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...
WeiterlesenThis book constitutes the refereed proceedings of the Third International Computer Science Symposium in Russia, CSR 2008, ...
WeiterlesenThis book constitutes the refereed proceedings of the First International Symposium on Computer Science in Russia, CSR 2006. ...
WeiterlesenCoverage includes automated deduction and interactive theorem proving, constructive mathematics and type theory, equational ...
WeiterlesenThis book covers theory track deals with algorithms, protocols, and data structures; complexity and cryptography; formal ...
WeiterlesenThis book covers theory track deals with algorithms, protocols, and data structures; complexity and cryptography; formal ...
WeiterlesenThis book constitutes the proceedings of the 15th International Computer Science Symposium in Russia, CSR 2020, held in Yekaterinburg, ...
WeiterlesenThese proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
WeiterlesenThis book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
WeiterlesenThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
WeiterlesenThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
WeiterlesenThis status report features the most recent developments in the field, spanning a wide range of topical areas in the computer ...
WeiterlesenThis volume represents a "status report" emanating from presentations made during the 18th Annual Workshop on Computer ...
WeiterlesenThe design of complex artifacts and systems requires the cooperation of multidisciplinary design teams using multiple commercial ...
Weiterlesen