The four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...
Lire la suiteThe four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...
Lire la suiteExplores the variety of techniques used to analyze and interpret images. It also describes challenging real-world applications ...
Lire la suiteMany communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access ...
Lire la suiteThis book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current ...
Lire la suiteThe development of Internet, mobile communications, distributed computing, computer software and databases storing essential ...
Lire la suiteProvides an overview of different deep learning-based methods for face recognition and related problems. Specifically, the ...
Lire la suiteDeep learning has been successfully applied to solve various complex problems ranging from big data analytics to computer ...
Lire la suiteThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Lire la suiteThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Lire la suiteThis book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
Lire la suiteThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
Lire la suiteThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
Lire la suiteBreast cancer is a disease in which abnormal cells in the breast tissues multiply and form an invasive (or malignant) tumor. ...
Lire la suiteConstitutes the refereed proceedings of the Third International Conference on Distributed Computing and Internet Technology, ...
Lire la suitePresents an overview of dynamic methods for structural health monitoring and damage detection in structures. This book explains ...
Lire la suiteVoting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
Lire la suiteVoting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...
Lire la suiteVideo summarization is defined as the generation of a summary of extensive video content that comes from all kinds of videos ...
Lire la suiteThis book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting ...
Lire la suite