This book is a collection of carefully selected works presented at the Third International Conference on Computer Vision ...
Continue readingOn behalf of the PROFES Organizing Committee we are proud to present to you the proceedings of the 6th International Conference ...
Continue readingThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Continue readingThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Continue readingThis book is organized in topical sections on signal analysis for characterization and filtering, analysis of shape and texture, ...
Continue readingQoS is an important subject which occupies a central place in overall packet network technologies. A complex subject, its ...
Continue readingInformation security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...
Continue readingQuantitative economic policy and econometrics were developed along with macroeconomics in the 1930s. Econometric techniques ...
Continue readingDiscuss the pathophysiology of autoimmune diseases in addition to both theoretical and practical aspects of quantitative ...
Continue readingThis book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Continue readingThis volume is composed of invited papers on learning and control. The contents form the proceedings of a workshop held in ...
Continue readingThe theory of linear models and regression analysis plays an essential role in the development of methods for the statistical ...
Continue readingThis book seeks to comprehensively address the face recognition problem while gaining new insights from complementary fields ...
Continue readingThis relatively nontechnical book is the first account of the history of statistics from the Fisher revolution to the computer ...
Continue readingConstitutes proceedings of the Second International Conference on Rough Sets and Knowledge Technology, RSKT 2007, held in ...
Continue readingRouting Congestion in VLSI Circuits: Estimation and Optimization provides the reader with a complete understanding of the ...
Continue readingIt aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...
Continue readingBiometrics is becoming increasingly common in establishments that require high security such as state security and financial ...
Continue readingNoisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...
Continue readingThis book deals with the various issues related to the use of small electronic tokens in the process of human-machine interactions. ...
Continue reading