Media forensics has never been more relevant to societal life. Not only media content represents an ever-increasing share ...
Continue readingProvides an insight about various techniques used in multimedia security and identifies its progress in both technological ...
Continue readingMultimodal Processing and Interaction: Audio, Video and Text presents high quality, state-of-the-art research ideas and results ...
Continue readingThis book constitutes the thoroughly refereed joint post-workshop proceedings of two co-located events: the Second International ...
Continue readingThe book is aimed at statisticians, applied mathematicians, and engineers working on problems dealing with multiscale processes ...
Continue readingMultivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...
Continue readingMusculoskeletal Ultrasound: Anatomy and Technique tackles the fundamentals of ultrasound, from physics, artifact recognition ...
Continue readingThe future focus of nanotechnology will be on realizing new functions over greater scales. This book describes the creation ...
Continue readingFundamental Biomedical Technologies features titles in multidisciplinary, technology-driven areas, providing the foundations ...
Continue readingThis book, edited and authored by a team of world-leading researchers, provides a broad overview of advanced photonic methods ...
Continue readingThis book is open access under a CC BY 4.0 license.This book brings together research findings and experiences from science, ...
Continue readingThis book is focused on the intersection between urban brownfields and the sustainability transitions of metreopolitan areas, ...
Continue reading‘Network’ is a heavily overloaded term, so that ‘network analysis’ means different things to different people. Specific ...
Continue readingThis book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC ...
Continue readingThis book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
Continue readingThe advent of new neutron facilities and the improvement of existing sources and instruments world wide supply the biological ...
Continue readingThe theory of formal languages is widely recognized as the backbone of theoretical computer science, originating from mathematics ...
Continue readingThis book introduces new methods for measuring and analyzing residential segregation. It begins by placing all popular ...
Continue readingEthnography is uniquely equipped to look microscopically at the foundations of political institutions and their attendant ...
Continue readingThe goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...
Continue reading