The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
Continue readingThis inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
Continue readingThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Continue readingTransactions on HiPEAC is a new journal which aims at the timely dissemination of research contributions in computer architecture ...
Continue readingInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Continue readingThis volume addresses the demand for theories and applications of intelligent systems and computer engineering to meet the ...
Continue readingTrend in Neural Computation includes twenty chapters either contributed from leading experts or formed by extending well ...
Continue readingThis book is entirely about triangulations. With emphasis on computational issues, we present the basic theory necessary ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the Second Symposium on Trustworthy Global Computing, TGC ...
Continue readingA major focus of Turbo-like Codes is on high speed turbo decoding, which targets applications with data rates of several ...
Continue readingThe primary purpose of TUTORIALS ON EMERGING METHODOLOGIES AND APPLICATIONS IN OPERATIONS RESEARCH is to provide a reference ...
Continue readingThis book describes new methods for building intelligent systems using type-2 fuzzy logic and soft computing techniques. ...
Continue readingThe 7th International Conference on Typed Lambda Calculi and Applications (TLCA 2005) was held in Nara (Japan) from 21 to ...
Continue readingThe refereed post-proceedings of the International Workshop of the Types Working Group are presented in this volume. The ...
Continue readingThe topic of this book was formal reasoning and computer programming based on type theory. Great importance was attached ...
Continue readingOver recent years most business processes have changed in various dimensions (e. g. , ?exibility, interconnectivity, coordination ...
Continue readingThis volume provides a comprehensive view of unconstrained face recognition, especially face recognition from multiple still ...
Continue readingThis book constitutes the refereed proceedings of the Sixth International Conference on Unconventional Computation, UC 2007,organized ...
Continue readingThe Fourth International Conference on Unconventional Computation, UC 2005, organized under the auspices of EATCS by the ...
Continue readingThis book about The 5th International Conference on Unconventional Computation, UC 2006,organized under the auspices of the ...
Continue reading