Electronic Books

Total Books: 121 - 140 /152
Security, Privacy and Trust in Modern Data Management

In the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect ...

Lire la suite
Signal Processing Techniques for Knowledge Extraction and Information Fusion

This state-of-the-art resource brings together the latest findings from the cross-fertilization of signal processing, machine ...

Lire la suite
Smart Card Research and Advanced Applications

Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...

Lire la suite
Smart Cards, Tokens, Security and Applications

This book provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the ...

Lire la suite
Smart Sensing and Context

EuroSSC 2007 aimed to reflect two complementary viewpoints: a technology-driven viewpoint which encompasses the diversity ...

Lire la suite
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing

The 9th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed ...

Lire la suite
Software Technologies for Embedded and Ubiquitous Systems

This book constitutes the thoroughly refereed post-proceedings of the 5th IFIP WG 10.2 International Workshop on Software ...

Lire la suite
Speaker Classification I

This volume and its companion volume, LNAI 4441, constitute a state-of-the-art survey for the field of speaker classification. ...

Lire la suite
Speech and Audio Processing in Adverse Environments

The book reflects the state of the art in important areas of speech and audio signal processing. It presents topics which ...

Lire la suite
Stabilization, Safety, and Security of Distributed Systems

This book contains the proceedings of the 8th International Symposium, SSS 2006, held in Dallas, TX, USA, November 17-19, ...

Lire la suite
Statistical Tools for Finance and Insurance

Statistical Tools in Finance and Insurance presents ready-to-use solutions, theoretical developments and method construction ...

Lire la suite
Stochastic Learning and Optimization

(Four areas in one book) This book covers various disciplines in learning and optimization, including perturbation analysis ...

Lire la suite
Stochastic Theory and Control : Proceedings of a Workshop held in Lawrence, Kansas

This volume contains almost all of the papers that were presented at the Workshop on Stochastic Theory and Control that was ...

Lire la suite
Substructuring Method for Civil Structural Health Monitoring / Shun Weng , Hongping Zhu , Yong Xia

Investigates the substructuring technology in structural health monitoring (SHM) to improve the accuracy and efficiency of ...

Lire la suite
Technology Enhanced Learning

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Lire la suite
The Internet of Things : First International Conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008. Proceedings

This volume contains the proceeding softhe Internet of Things (IOT)Conference 2008, the ?rst international conference of ...

Lire la suite
The RFID Roadmap: The Next Steps for Europe

RFID is a key technology for Europe. Today we are witnessing a noticeable shift away from RFID pilot projects of the early ...

Lire la suite
The Role of Origin of Fame in Influencer Branding: A Comparative Analysis of German and Russian Consumers

Based on a comprehensive quantitative study, Julia Sinnig shows that the impact social media influencers have on brand-related ...

Lire la suite
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

Lire la suite
Topics in Cryptology - CT-RSA 2008 : The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings

This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...

Lire la suite
Total Books: 121 - 140 /152