The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
Lire la suiteThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Lire la suiteThis book subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, ...
Lire la suiteVolume IV of the Transactions on Rough Sets (TRS) introduces a number of new advances in the theory and application of rough ...
Lire la suitethis volume introduces a number of new advances in the foundations and applications of artificial intelligence, engineering, ...
Lire la suiteThis volume of the TRS presents papers that reflect the profound influence of a number of research initiatives by Zdzislaw ...
Lire la suiteTranslational Urinomics provides an overview of urine analysis using proteomics, metabolomics, transcriptomics or any combination ...
Lire la suiteThis book constitutes the thoroughly refereed proceedings of the 33rd International Conference on Industrial, Engineering ...
Lire la suiteThis volume addresses the demand for theories and applications of intelligent systems and computer engineering to meet the ...
Lire la suiteWith the rapid development of information and network technologies and market requirements, new challenges in supply chain ...
Lire la suiteWritten for the non-specialist seeking an authoritative but accessible overview of this interdisciplinary field, True Visions ...
Lire la suiteThis book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised ...
Lire la suiteThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Lire la suiteThe volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
Lire la suiteThis book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...
Lire la suiteThe book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
Lire la suiteThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Lire la suiteTrusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...
Lire la suiteThis book presents new research on the mathematical description of tsunamis and hurricanes. The book uses the equivalence ...
Lire la suiteTurbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...
Lire la suite