The book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
Continue reading
this year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop ...
Continue reading
This book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, ...
Continue reading
This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, ...
Continue reading
Food insecurity is a central concern and a fundamental challenge for human welfare and economic growth in Africa. Low agricultural ...
Continue reading
Advances in Molecular Breeding toward Drought and Salt Tolerant Crops seeks to integrate the most recent findings about key ...
Continue reading
PCM 2006 again brought together researchers, developers, practitioners, and educators in the ?eld of multimedia from around ...
Continue reading
This book is organized in topical sections on image classification and retrieval, the AVS china national standard - technology, ...
Continue reading
This book is organized in topical sections on image classification and retrieval, the AVS china national standard - technology, ...
Continue reading
The two volume set LNCS 4351 and LNCS 4352 constitutes the refereed proceedings of the 13th International Multimedia Modeling ...
Continue reading
Reviews the progress made in salivary diagnostics during the past two decades and identifies the likely direction of future ...
Continue reading
This book contributes the thoroughly refereed post-conference proceedings of the 6th International Conference on Web-Based ...
Continue reading
The discipline of data mining delivers methodologies and tools for the an- ysis of large data volumes and the extraction ...
Continue reading
The discipline of data mining delivers methodologies and tools for the an- ysis of large data volumes and the extraction ...
Continue reading
Thisbookcontainsthepostworkshopproceedingsofthe7thInternationalWo- shop on Knowledge Discovery from the Web, WEBKDD 2005. ...
Continue reading
With the increasing ubiquity of personal computing devices, such as mobile phones and PDAs, and the increasing deployment ...
Continue reading
With the increasing ubiquity of personal computing devices, such as mobile phones and PDAs, and the increasing deployment ...
Continue reading
Security systems have become an integral part of the building and large complex setups, and intervention of the computational ...
Continue reading
BIOTA is an interdisciplinary research project focusing on sustainable use and conservation of biodiversity in Africa (http://www.biote-africa.de). ...
Continue reading
This book develops a framework for advancing agroecology transformations focusing on power, politics and governance. It ...
Continue reading