Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
Lire la suiteDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. ...
Lire la suiteThis volume contains a subset of the papers presented at the 10th Panhellenic Conference in Informatics (PCI 2005), which ...
Lire la suiteSimple tutorial chapters introduce the reader to cutting edge technologies, such as parallel and distributed computing, object-oriented ...
Lire la suiteMachine learning and cybernetics play an important role in many modern electronic, computer and communications systems. Automated ...
Lire la suiteThis Volume presents the most exciting results of the Mobile and Wireless Communication Summit, held 2007 in Budapest. It ...
Lire la suiteThe two volume set LNCS 4351 and LNCS 4352 constitutes the refereed proceedings of the 13th International Multimedia Modeling ...
Lire la suiteThis volume comprises the communications presented at the ETC 11, the EUROMECH European Turbulence Conference held in 2007 ...
Lire la suiteIn 2005, two AOIS workshops were held internationally. The first was affiliated with the AAMAS 2005 meeting in July in Utrecht ...
Lire la suiteDiscusses existing conventional radio frequency (RF)-based wireless access technology and presents the challenges that can ...
Lire la suitePoint processes and random measures find wide applicability in telecommunications, earthquakes, image analysis, spatial point ...
Lire la suiteThis book covers the analysis and design of nonlinear analog integrated circuits that form the basis of present-day communication ...
Lire la suiteIntended for anyone who has an interest to learn the analysis and design of analog and digital systems. The book covers the ...
Lire la suiteAnalysis of Computer and Communication Networks presents the academic and research communities with mathematical theory and ...
Lire la suiteThis book constitutes the refereed joint proceedings of seven workshops on evolutionary computing, EvoWorkshops 2006, held ...
Lire la suiteThe 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ...
Lire la suiteIn The Uses of Argument Stephen Toulmin proposed a new model for the layout of arguments, with six components: claim, data, ...
Lire la suiteThe purpose of this book is to give an up-to date view of the scientific production in the fields of Agent-based Computational ...
Lire la suiteDiscusses the future possibilities of AI with cloud computing and edge computing. Aims to conduct analyses, implementation ...
Lire la suiteDiscusses the evolution of future generation technologies through Internet of Things (IoT) in the scope of Artificial Intelligence ...
Lire la suite