Electronic Books

Total Books: 41 - 60 /180
978-3-540-88690-7
Computer Vision - ECCV 2008 : 10th European Conference on Computer Vision, Marseille, France, October 12-18, 2008, Proceedings, Part III

The four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...

Continue reading
978-3-540-88693-8
Computer Vision - ECCV 2008 : 10th European Conference on Computer Vision, Marseille, France, October 12-18, 2008, Proceedings, Part IV

The four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...

Continue reading
978-3-030-34372-9
Computer Vision : Algorithms and Applications / Richard Szeliski

Explores the variety of techniques used to analyze and interpret images. It also describes challenging real-world applications ...

Continue reading
978-1-4020-4075-7
Coordinated Multiuser Communications

Many communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access ...

Continue reading
NoIMG
Cybersecurity of Digital Service Chains : Challenges, Methodologies, and Tools

This book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current ...

Continue reading
978-1-4020-3381-0
Cyberspace Security and Defense: Research Issues

The development of Internet, mobile communications, distributed computing, computer software and databases storing essential ...

Continue reading
978-3-030-74697-1
Deep Learning-Based Face Analytics / Nalini K Ratha, Dr. Vishal M. Patel

Provides an overview of different deep learning-based methods for face recognition and related problems. Specifically, the ...

Continue reading
NoIMG
Deep fake detection / Malek Sharaf Al-Deen ; Ali Issa ; Abdullah Tellawi ; Ahmad Jamal Al-Deen

Deep learning has been successfully applied to solve various complex problems ranging from big data analytics to computer ...

Continue reading
978-3-540-73614-1
Detection of Intrusions and Malware, and Vulnerability Assessment

This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response

Continue reading
978-3-540-73614-1
Detection of Intrusions and Malware, and Vulnerability Assessment

This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response

Continue reading
978-3-540-36017-9
Detection of Intrusions and Malware, and Vulnerability Assessment

This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...

Continue reading
978-3-030-52683-2
Detection of Intrusions and Malware, and Vulnerability Assessment : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings

This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...

Continue reading
978-3-540-70542-0
Detection of Intrusions and Malware, and Vulnerability Assessment : 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...

Continue reading
NoIMG
Development of breast cancer therapy and gender / Deema Darkal ; Bayan Aboulebadeh ; Hasnaa Qutait

Breast cancer is a disease in which abnormal cells in the breast tissues multiply and form an invasive (or malignant) tumor. ...

Continue reading
978-3-540-68380-3
Distributed Computing and Internet Technology (vol. # 4317)

Constitutes the refereed proceedings of the Third International Conference on Distributed Computing and Internet Technology, ...

Continue reading
978-3-211-78777-9
Dynamic Methods for Damage Detection in Structures

Presents an overview of dynamic methods for structural health monitoring and damage detection in structures. This book explains ...

Continue reading
978-3-540-77493-8
E-Voting and Identity

Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...

Continue reading
978-3-540-77493-8
E-Voting and Identity

Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...

Continue reading
NoIMG
Egocentric video summarization / Adnan Asfari ; Mayar Al Zerki ; Mohammad Eyad Akkach

Video summarization is defined as the generation of a summary of extensive video content that comes from all kinds of videos ...

Continue reading
978-3-319-51103-0
Error-Correction Coding and Decoding

This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting ...

Continue reading
Total Books: 41 - 60 /180