The 110 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 226 submissions. ...
Continue readingThis book constitutes the refereed proceedings of the Third International Conference on Image and Signal Processing, ICISP ...
Continue readingThis book is a comprehensive treatment of inference for hidden Markov models, including both algorithms and statistical theory. ...
Continue readingComplete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...
Continue readingThis book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...
Continue readingThis book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...
Continue readingThe book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...
Continue readingThis book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
Continue readingThe process of firms’ growth – in terms of productivity or employment – is a major concern of policy makers. In this ...
Continue readingIntelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...
Continue readingIntelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...
Continue readingIn the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development ...
Continue readingThis book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, ...
Continue readingThis book is a comprehensive collection of chapters focusing on the core areas of computing and their further applications ...
Continue readingThis excellent textbook presents an introduction to the time series analysis. It provides a good source of information for ...
Continue readingThe International Conference on Life System Modeling and Simulation (LSMS) was formed to bring together international researchers ...
Continue readingThebookisbasedonseveralyearsofexperienceofbothauthorsinteaching linear models at various levels. It gives an up-to-date account ...
Continue readingIn this book, experts in statistics and psychometrics describe classes of linkages, the history of score linkings, data collection ...
Continue readingAt the system level, a novel systematic study on the full feedforward Sigma-Delta topology is presented in this book. As ...
Continue readingThis book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being ...
Continue reading