This book constitutes the refereed proceedings of the Third International Workshop on Security, IWSEC 2008, held in Kagawa, ...
Continue reading
Food insecurity is a central concern and a fundamental challenge for human welfare and economic growth in Africa. Low agricultural ...
Continue reading
Mastering and effective exploration of the web environment needs new ideas, adaptation of known methods as well as application ...
Continue reading
Advances in Molecular Breeding toward Drought and Salt Tolerant Crops seeks to integrate the most recent findings about key ...
Continue reading
PCM 2006 again brought together researchers, developers, practitioners, and educators in the ?eld of multimedia from around ...
Continue reading
This book is organized in topical sections on image classification and retrieval, the AVS china national standard - technology, ...
Continue reading
This book is organized in topical sections on image classification and retrieval, the AVS china national standard - technology, ...
Continue reading
The two volume set LNCS 4351 and LNCS 4352 constitutes the refereed proceedings of the 13th International Multimedia Modeling ...
Continue reading
It includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
Continue reading
It includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
Continue reading
The chapters in this volume were presented at the July 2005NATO Advanced Study Institute on Advances in Sensing with Security ...
Continue reading
This book contributes the thoroughly refereed post-conference proceedings of the 6th International Conference on Web-Based ...
Continue reading
The discipline of data mining delivers methodologies and tools for the an- ysis of large data volumes and the extraction ...
Continue reading
The discipline of data mining delivers methodologies and tools for the an- ysis of large data volumes and the extraction ...
Continue reading
Thisbookcontainsthepostworkshopproceedingsofthe7thInternationalWo- shop on Knowledge Discovery from the Web, WEBKDD 2005. ...
Continue reading
With the increasing ubiquity of personal computing devices, such as mobile phones and PDAs, and the increasing deployment ...
Continue reading
With the increasing ubiquity of personal computing devices, such as mobile phones and PDAs, and the increasing deployment ...
Continue reading
Security systems have become an integral part of the building and large complex setups, and intervention of the computational ...
Continue reading
This edited volume is concerned with the evolution and achievements of cooperation in research and innovation between Africa ...
Continue reading
Includes a summary for each of the four panels at XP 2019 is included. The panels were on security and privacy; the impact ...
Continue reading