This book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, ...
Continue readingRecent applications of microwave and high-frequency radiation in the field of materials processing, chemical synthesis, food ...
Continue readingThis book and its sister volumes constitute the Proceedings of the Third International Symposium on Neural Networks (ISNN ...
Continue readingThis book and its sister volumes constitute the Proceedings of the Third International Symposium on Neural Networks (ISNN ...
Continue readingThis book and its sister volumes constitute the Proceedings of the Third International Symposium on Neural Networks (ISNN ...
Continue readingThe chapters in this volume were presented at the July 2005NATO Advanced Study Institute on Advances in Sensing with Security ...
Continue readingSecurity systems have become an integral part of the building and large complex setups, and intervention of the computational ...
Continue readingCALCO, the Conference on Algebra and Coal-gebra in Computer Science, was created to bring together researchers ...
Continue readingThe improvements in computation and communication capabilities have enabled the creation of demanding applications in critical ...
Continue readingThe improvements in computation and communication capabilities have enabled the creation of demanding applications in critical ...
Continue readingThousands of mini computers (comparable to a stick of chewing gum in size), equipped with sensors, are deployed in some terrain ...
Continue readingThousands of mini computers (comparable to a stick of chewing gum in size), equipped with sensors, are deployed in some terrain ...
Continue readingAmbient Intelligence is one of the new paradigms in the development of information and communication technology, which has ...
Continue readingThis book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information ...
Continue readingEvolutionary computation (EC) techniques are e?cient nature-inspired pl- ning and optimization methods based on the principles ...
Continue readingThis book constitutes the refereed joint proceedings of seven workshops on evolutionary computing, EvoWorkshops 2006, held ...
Continue readingThis volume presents a careful selection of relevant EC examples combined with a thorough examination of the techniques used ...
Continue readingThis book provides detailed insights into recent works dealing with a large spectrum of issues in system-on-chip design, ...
Continue readingThe two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography ...
Continue readingThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
Continue reading