The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
Lee masThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Lee masThis book subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, ...
Lee masVolume IV of the Transactions on Rough Sets (TRS) introduces a number of new advances in the theory and application of rough ...
Lee masthis volume introduces a number of new advances in the foundations and applications of artificial intelligence, engineering, ...
Lee masThis volume of the TRS presents papers that reflect the profound influence of a number of research initiatives by Zdzislaw ...
Lee masTranslational Urinomics provides an overview of urine analysis using proteomics, metabolomics, transcriptomics or any combination ...
Lee masThis book constitutes the thoroughly refereed proceedings of the 33rd International Conference on Industrial, Engineering ...
Lee masThis volume addresses the demand for theories and applications of intelligent systems and computer engineering to meet the ...
Lee masWith the rapid development of information and network technologies and market requirements, new challenges in supply chain ...
Lee masWritten for the non-specialist seeking an authoritative but accessible overview of this interdisciplinary field, True Visions ...
Lee masThis book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised ...
Lee masThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Lee masThe volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
Lee masThis book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...
Lee masThe book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
Lee masThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Lee masTrusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...
Lee masThis book presents new research on the mathematical description of tsunamis and hurricanes. The book uses the equivalence ...
Lee masTurbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...
Lee mas