The goal of this book is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. ...
Continue reading
The goal of this book is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. ...
Continue reading
Your immune system is unique. It is in many ways as complex as your brain, butit is not centred in one location, like the ...
Continue reading
ICARIS 2006 is the ?fth instance of a series of conferences dedicated to the comprehension and the exploitation of immunological ...
Continue reading
Offers solutions to the problems of security, outlining the concepts behind allowing computers to learn from experience and ...
Continue reading
This book contains the proceedings of the First European Conference on Computer Network Defence which took place in December ...
Continue reading
This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...
Continue reading
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...
Continue reading
This volume contains selected papers, presented at the international conference on Intelligent Information Processing and ...
Continue reading
MLDM / ICDM Medaillie Meissner Porcellan, the “White Gold” of King August the Strongest of Saxonia Gottfried Wilhelm ...
Continue reading
This book constitutes the refereed proceedings of the International Conference on Rough Sets and Emerging Intelligent Systems ...
Continue reading
The 9th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed ...
Continue reading