The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
Continue reading
The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Continue reading
This book subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, ...
Continue reading
Volume IV of the Transactions on Rough Sets (TRS) introduces a number of new advances in the theory and application of rough ...
Continue reading
this volume introduces a number of new advances in the foundations and applications of artificial intelligence, engineering, ...
Continue reading
This volume of the TRS presents papers that reflect the profound influence of a number of research initiatives by Zdzislaw ...
Continue reading
Translational Urinomics provides an overview of urine analysis using proteomics, metabolomics, transcriptomics or any combination ...
Continue reading
This book constitutes the thoroughly refereed proceedings of the 33rd International Conference on Industrial, Engineering ...
Continue reading
This volume addresses the demand for theories and applications of intelligent systems and computer engineering to meet the ...
Continue readingWith the rapid development of information and network technologies and market requirements, new challenges in supply chain ...
Continue reading
Written for the non-specialist seeking an authoritative but accessible overview of this interdisciplinary field, True Visions ...
Continue reading
This book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised ...
Continue reading
The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue reading
The volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
Continue reading
This book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...
Continue reading
The book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
Continue reading
This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Continue reading
Trusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...
Continue reading
This book presents new research on the mathematical description of tsunamis and hurricanes. The book uses the equivalence ...
Continue reading
Turbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...
Continue reading