Vast amounts of data are collected by service providers and system administ- tors, and are available in public information ...
Lire la suiteThis book is a collection of carefully selected works presented at the Third International Conference on Computer Vision ...
Lire la suiteThis book is a collection of carefully selected works presented at the Third International Conference on Computer Vision ...
Lire la suiteThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Lire la suiteThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Lire la suiteThis book is organized in topical sections on signal analysis for characterization and filtering, analysis of shape and texture, ...
Lire la suiteThis book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Lire la suiteThis book seeks to comprehensively address the face recognition problem while gaining new insights from complementary fields ...
Lire la suiteConstitutes proceedings of the Second International Conference on Rough Sets and Knowledge Technology, RSKT 2007, held in ...
Lire la suiteIt aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...
Lire la suiteBiometrics is becoming increasingly common in establishments that require high security such as state security and financial ...
Lire la suiteNoisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...
Lire la suiteThis book deals with the various issues related to the use of small electronic tokens in the process of human-machine interactions. ...
Lire la suiteThis book is organized in topical sections on smart objects, spatial and human context inference, context processing and ...
Lire la suiteWith contributions by leading scientists in the field, this book gives the first comprehensive overview of the results of ...
Lire la suiteThis two volume set, LNAI 4343 and LNAI 4441, constitutes a state-of-the-art survey for the field of speaker classification. ...
Lire la suiteAll the data was out there to warn us of this impending attack, why didn't we see it?" This was a frequently asked question ...
Lire la suiteThis book shows that the joint distribution of the test statistics at different analysis times is asymptotically multivariate ...
Lire la suiteThis book constitutes the refereed proceedings of the 11th International Workshop on Structural and Syntactic Pattern Recognition, ...
Lire la suiteThis book includes : graph-based methods, probabilistic and stochastic structural models for PR, image and video analysis, ...
Lire la suite