Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
Lee masDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
Lee masThis volume contains a subset of the papers presented at the 10th Panhellenic Conference in Informatics (PCI 2005), which ...
Lee masSimple tutorial chapters introduce the reader to cutting edge technologies, such as parallel and distributed computing, object-oriented ...
Lee masMachine learning and cybernetics play an important role in many modern electronic, computer and communications systems. Automated ...
Lee masThis Volume presents the most exciting results of the Mobile and Wireless Communication Summit, held 2007 in Budapest. It ...
Lee masThe two volume set LNCS 4351 and LNCS 4352 constitutes the refereed proceedings of the 13th International Multimedia Modeling ...
Lee masThis volume comprises the communications presented at the ETC 11, the EUROMECH European Turbulence Conference held in 2007 ...
Lee masIn 2005, two AOIS workshops were held internationally. The first was affiliated with the AAMAS 2005 meeting in July in Utrecht ...
Lee masDiscusses existing conventional radio frequency (RF)-based wireless access technology and presents the challenges that can ...
Lee masPoint processes and random measures find wide applicability in telecommunications, earthquakes, image analysis, spatial point ...
Lee masThis book covers the analysis and design of nonlinear analog integrated circuits that form the basis of present-day communication ...
Lee masIntended for anyone who has an interest to learn the analysis and design of analog and digital systems. The book covers the ...
Lee masAnalysis of Computer and Communication Networks presents the academic and research communities with mathematical theory and ...
Lee masThis book constitutes the refereed joint proceedings of seven workshops on evolutionary computing, EvoWorkshops 2006, held ...
Lee masThe 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ...
Lee masIn The Uses of Argument Stephen Toulmin proposed a new model for the layout of arguments, with six components: claim, data, ...
Lee masThe purpose of this book is to give an up-to date view of the scientific production in the fields of Agent-based Computational ...
Lee masDiscusses the future possibilities of AI with cloud computing and edge computing. Aims to conduct analyses, implementation ...
Lee masDiscusses the evolution of future generation technologies through Internet of Things (IoT) in the scope of Artificial Intelligence ...
Lee mas