Electronic Books

Total Books: 41 - 60 /191
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Lire la suite
Computer Vision - ECCV 2008 : 10th European Conference on Computer Vision, Marseille, France, October 12-18, 2008, Proceedings, Part I

The four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...

Lire la suite
Computer Vision - ECCV 2008 : 10th European Conference on Computer Vision, Marseille, France, October 12-18, 2008, Proceedings, Part II

The four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...

Lire la suite
Computer Vision - ECCV 2008 : 10th European Conference on Computer Vision, Marseille, France, October 12-18, 2008, Proceedings, Part III

The four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...

Lire la suite
Computer Vision - ECCV 2008 : 10th European Conference on Computer Vision, Marseille, France, October 12-18, 2008, Proceedings, Part IV

The four-volume set comprising LNCS volumes 5302/5303/5304/5305 constitutes the refereed proceedings of the 10th European ...

Lire la suite
Computer Vision : Algorithms and Applications / Richard Szeliski

Explores the variety of techniques used to analyze and interpret images. It also describes challenging real-world applications ...

Lire la suite
Coordinated Multiuser Communications

Many communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access ...

Lire la suite
NoIMG
Cybersecurity of Digital Service Chains : Challenges, Methodologies, and Tools

This book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current ...

Lire la suite
Cyberspace Security and Defense: Research Issues

The development of Internet, mobile communications, distributed computing, computer software and databases storing essential ...

Lire la suite
Deep Learning-Based Face Analytics / Nalini K Ratha, Dr. Vishal M. Patel

Provides an overview of different deep learning-based methods for face recognition and related problems. Specifically, the ...

Lire la suite
NoIMG
Deep fake detection / Malek Sharaf Al-Deen ; Ali Issa ; Abdullah Tellawi ; Ahmad Jamal Al-Deen

Deep learning has been successfully applied to solve various complex problems ranging from big data analytics to computer ...

Lire la suite
NoIMG
Deepfake detection / Abdelrahman Al-Asha , John Al-Nemeh , Philip Elias and Mhd Tysser Al-Mallah ; Supervised by Raouf Hamdan and Khloud Al-Jallad عبد الرحمن العشا ، جون النعمة ، فيليب اميران الياس و محمد تيسير الملاح ؛ إشراف رؤوف حمدان و خلود الجلاد

The rise of large language models (LLMs) and the increasing sophistication of deepfake images have made detecting synthetic ...

Lire la suite
Detection of Intrusions and Malware, and Vulnerability Assessment

This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response

Lire la suite
Detection of Intrusions and Malware, and Vulnerability Assessment

This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response

Lire la suite
Detection of Intrusions and Malware, and Vulnerability Assessment

This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...

Lire la suite
Detection of Intrusions and Malware, and Vulnerability Assessment : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings

This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...

Lire la suite
Detection of Intrusions and Malware, and Vulnerability Assessment : 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...

Lire la suite
NoIMG
Developing bus management system for AIU محمد وسيم أويس العجلاني ؛ نجود عبدالله السالم ؛ دانة غسان الغميان ؛ رغد خليفة ؛ إشراف د.سيرا استور

To solve the problem of congestion in bus stops for students, members of the administrative and educational people at the ...

Lire la suite
NoIMG
Development of breast cancer therapy and gender / Deema Darkal ; Bayan Aboulebadeh ; Hasnaa Qutait

Breast cancer is a disease in which abnormal cells in the breast tissues multiply and form an invasive (or malignant) tumor. ...

Lire la suite
Distributed Computing and Internet Technology (vol. # 4317)

Constitutes the refereed proceedings of the Third International Conference on Distributed Computing and Internet Technology, ...

Lire la suite
Total Books: 41 - 60 /191