Security is one of the most significant issues facing the owners and users of computer systems in the Internet age, and recent ...
Lire la suiteThis volume contains the final proceedings for the 2004 Computer Music Model-ing and Retrieval Symposium (CMMR 2004). CMMR ...
Lire la suiteAs society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...
Lire la suiteThis volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...
Lire la suiteThis book constitutes the thoroughly refereed proceedings of the 21st International Conference on Computer Processing of ...
Lire la suiteComputer recognition systems are nowadays one of the most promising directions in artificial intelligence. This book presents ...
Lire la suiteThe conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability ...
Lire la suiteThis book constitutes the proceedings of the 15th International Computer Science Symposium in Russia, CSR 2020, held in Yekaterinburg, ...
Lire la suiteThese proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
Lire la suiteThis book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...
Lire la suiteComputer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances ...
Lire la suiteThis book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
Lire la suiteThis extensive and comprehensive collection of lectures by world-leading experts in the field introduces and reviews all ...
Lire la suiteThis extensive and comprehensive collection of lectures by world-leading experts in the field introduces and reviews all ...
Lire la suiteThis book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...
Lire la suiteExplores the variety of techniques used to analyze and interpret images. It also describes challenging real-world applications ...
Lire la suiteRecently, there has been a dramatic increase in the use of sensors in the non-visible bands. As a result, there is a need ...
Lire la suiteComputer Vision has reached a level of maturity that allows us not only to p- form research on individual methods and system ...
Lire la suiteThe objectives of the ICCVG are: presentation of current research topics and d- cussions leading to the integration of the ...
Lire la suiteThe purpose of this book is to submit the workshop, “Computer Vision for Biomedical Image Applications: Current Techniques ...
Lire la suite