The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
Lee mas
The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Lee mas
This book subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, ...
Lee mas
Volume IV of the Transactions on Rough Sets (TRS) introduces a number of new advances in the theory and application of rough ...
Lee mas
this volume introduces a number of new advances in the foundations and applications of artificial intelligence, engineering, ...
Lee mas
This volume of the TRS presents papers that reflect the profound influence of a number of research initiatives by Zdzislaw ...
Lee mas
Translational Urinomics provides an overview of urine analysis using proteomics, metabolomics, transcriptomics or any combination ...
Lee mas
This book constitutes the thoroughly refereed proceedings of the 33rd International Conference on Industrial, Engineering ...
Lee mas
This volume addresses the demand for theories and applications of intelligent systems and computer engineering to meet the ...
Lee masWith the rapid development of information and network technologies and market requirements, new challenges in supply chain ...
Lee mas
Written for the non-specialist seeking an authoritative but accessible overview of this interdisciplinary field, True Visions ...
Lee mas
This book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised ...
Lee mas
The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Lee mas
The volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
Lee mas
This book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...
Lee mas
The book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
Lee mas
This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Lee mas
Trusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...
Lee mas
This book presents new research on the mathematical description of tsunamis and hurricanes. The book uses the equivalence ...
Lee mas
Turbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...
Lee mas