Offers advanced content on computer vision (basic content can be found in its prerequisite textbook, “2D Computer Vision: ...
Lee mas3D Manufacturing Innovation introduces the best practices developed by Toyota, Sony, Nikon, Casio and other pioneers in the ...
Lee masShows you: how customer and market potential can be automatically identified and profiled; how media planning can be intelligently ...
Lee masPresents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, ...
Lee masExplains the important concepts and principles of image processing to implement the algorithms and techniques to discover ...
Lee masThis book serves as an introduction to the state of the art on data warehouse design, with many references to more detailed ...
Lee masthis book explores a collaborative approach by proposing novel memory hierarchies and software optimization techniques for ...
Lee masThis book constitutes the thoroughly refereed joint post-workshop proceedings of three international workshops held in conjunction ...
Lee masThe individual papers represent a valuable collection of information on the current state-of-the-art research in the field ...
Lee masThis book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology ...
Lee masZero-knowledge interactive proofsystems are a new technique which can be used as a cryptographic tool for designing provably ...
Lee masThis book constitutes the refereed proceedings of the 25th Annual International Cryptology Conference, CRYPTO 2005, held ...
Lee masThe book address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis.
Lee masThe book address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis.
Lee masThe 2006 edition of the Eurocrypt conference was held in St. Petersburg,Russia from May 28 to June 1, 2006. It was the 25th ...
Lee masEurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the ...
Lee masThis book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology ...
Lee masThe book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
Lee masThe book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
Lee masAdvances in Digital Forensics IV describes original research results and innovative applications in the emerging discipline ...
Lee mas