The two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer ...
Lee mas
The two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer ...
Lee mas
This two-volume set LNCS 12759 and 12760 constitutes the refereed proceedings of the 33rd International Conference on Computer ...
Lee mas
This two-volume set LNCS 12759 and 12760 constitutes the refereed proceedings of the 33rd International Conference on Computer ...
Lee mas
This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
Lee mas
This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...
Lee mas
This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
Lee mas
For graduate and undergraduate courses in computer science, computer engineering, and electrical engineering. Comprehensively ...
Lee mas
Contains new examples and material highlighting the emergence of mobile computing and the cloud. It explores this generational ...
Lee mas
Designed to be used in modern computing environments such as cloud computing, mobile devices, and other embedded systems. ...
Lee mas
Presents the results of the 4th International Conference on Computer Recognition Sytems CORES-05. This book covers various ...
Lee masComputer recognition systems are nowadays one of the most promising directions in artificial intelligence. This book presents ...
Lee mas
This book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, ...
Lee mas
This book constitutes the refereed proceedings of the Third International Computer Science Symposium in Russia, CSR 2008, ...
Lee mas
This book constitutes the refereed proceedings of the First International Symposium on Computer Science in Russia, CSR 2006. ...
Lee mas
This book covers theory track deals with algorithms, protocols, and data structures; complexity and cryptography; formal ...
Lee mas
This book covers theory track deals with algorithms, protocols, and data structures; complexity and cryptography; formal ...
Lee mas
This book constitutes the thoroughly refereed post-proceedings of the 9th International Conference on Computer Supported ...
Lee mas
Computer Vision has reached a level of maturity that allows us not only to p- form research on individual methods and system ...
Lee mas
The purpose of the 7th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2008) and the 2nd IEEE/ACIS ...
Lee mas