In this book not only mathematical abstractions are discussed in a lucid manner, but also several practical applications ...
Continue readingAt the same time, I was a junior Brand Manager at Procter & Gamble w- ried about a much more mundane problem: how to keep ...
Continue readingIn this volume readers will find for the first time a detailed account of the theory of symplectic reduction by stages, ...
Continue readingHandbook of Multibiometrics, a professional book, introduces multibiometric systems, and demonstrates the noteworthy advantages ...
Continue readingThis book is the first comprehensive guide to a new soft computing technique which is used in complex forensic cases. The ...
Continue readingThis book constitutes the refereed proceedings of the 6th International Conference on Human Haptic Sensing and Touch Enabled ...
Continue readingHuman Ear Recognition by Computer is the first book on the automatic recognition of human ears. It presents an entire range ...
Continue readingIdentification and Control meets the difficulty of making practical use of new systems theory head on, presenting a selection ...
Continue readingThe book gives a comparative study of their gradient approximation accuracy, computational complexity, and convergence rates ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue readingConstitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...
Continue readingThe 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...
Continue readingThis book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ...
Continue readingThis book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...
Continue readingThis book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...
Continue readingInnovations and Advanced Techniques in Systems, Computing Sciences and Software Engineering includes a set of rigorously ...
Continue readingThis book constitutes the refereed proceedings of the 13th International Conference on Interactive Technologies and Sociotechnical ...
Continue readingThis book constitutes the refereed proceedings of the International Workshop on Knowledge Discovery in Life Science Literature, ...
Continue readingLEGAL PROGRAMMING: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond provides ...
Continue readingThis book provides a solid overview of mobile phone programming targeting both academia and industry. Mobile Phone Programming ...
Continue reading