Offers solutions to the problems of security, outlining the concepts behind allowing computers to learn from experience and ...
Lee masThis book presents innovative techniques in Recognition and Classification of Astrophysical and Medical Images. The contents ...
Lee masThis book discusses and proposes techniques for development of an automated multi-camera surveillance system for outdoor ...
Lee masSoftware development for the automotive domain is currently subject to a silent revolution. On the one hand, software has ...
Lee masThis book constitutes the refereed conference proceedings of the 12th International Conference on Bio-inspired Information ...
Lee masThis book constitutes the refereed proceedings of the International Workshop on Biosurveillance and Biosecurity, BioSecure ...
Lee masThis book offers 19 detailed protocols on the use of induced mutations in crop breeding and functional genomics studies, ...
Lee masBotnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based ...
Lee masThe text walks the reader through the basics of MRI, making it especially accessible to beginners. From a detailed outline ...
Lee masThis collection of papers offers real-life application experiences, research results and methodological proposals of direct ...
Lee masThis Brief presents new approaches and innovative challenges to address bringing technology into community-oriented policing ...
Lee masThis book constitutes the refereed proceedings of the Second International Workshop, IWCF 2008, held in Washington, DC, USA, ...
Lee masThis book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, ...
Lee masThis volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
Lee masThese proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
Lee masThis book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
Lee masThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Lee masThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Lee masThe four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...
Lee masThe four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...
Lee mas