Food insecurity is a central concern and a fundamental challenge for human welfare and economic growth in Africa. Low agricultural ...
Continue readingMastering and effective exploration of the web environment needs new ideas, adaptation of known methods as well as application ...
Continue readingAdvances in Molecular Breeding toward Drought and Salt Tolerant Crops seeks to integrate the most recent findings about key ...
Continue readingPCM 2006 again brought together researchers, developers, practitioners, and educators in the ?eld of multimedia from around ...
Continue readingThis book is organized in topical sections on image classification and retrieval, the AVS china national standard - technology, ...
Continue readingThis book is organized in topical sections on image classification and retrieval, the AVS china national standard - technology, ...
Continue readingThe two volume set LNCS 4351 and LNCS 4352 constitutes the refereed proceedings of the 13th International Multimedia Modeling ...
Continue readingIt includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
Continue readingIt includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
Continue readingThe chapters in this volume were presented at the July 2005NATO Advanced Study Institute on Advances in Sensing with Security ...
Continue readingThis book contributes the thoroughly refereed post-conference proceedings of the 6th International Conference on Web-Based ...
Continue readingThe discipline of data mining delivers methodologies and tools for the an- ysis of large data volumes and the extraction ...
Continue readingThe discipline of data mining delivers methodologies and tools for the an- ysis of large data volumes and the extraction ...
Continue readingThisbookcontainsthepostworkshopproceedingsofthe7thInternationalWo- shop on Knowledge Discovery from the Web, WEBKDD 2005. ...
Continue readingWith the increasing ubiquity of personal computing devices, such as mobile phones and PDAs, and the increasing deployment ...
Continue readingWith the increasing ubiquity of personal computing devices, such as mobile phones and PDAs, and the increasing deployment ...
Continue readingSecurity systems have become an integral part of the building and large complex setups, and intervention of the computational ...
Continue readingThis edited volume is concerned with the evolution and achievements of cooperation in research and innovation between Africa ...
Continue readingIncludes a summary for each of the four panels at XP 2019 is included. The panels were on security and privacy; the impact ...
Continue readingThis book develops a framework for advancing agroecology transformations focusing on power, politics and governance. It ...
Continue reading