The 110 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 226 submissions. ...
Lire la suiteThis book constitutes the refereed proceedings of the Third International Conference on Image and Signal Processing, ICISP ...
Lire la suiteThis book is a comprehensive treatment of inference for hidden Markov models, including both algorithms and statistical theory. ...
Lire la suiteComplete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...
Lire la suiteThis book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...
Lire la suiteThis book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...
Lire la suiteThe book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...
Lire la suiteThis book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
Lire la suiteThe process of firms’ growth – in terms of productivity or employment – is a major concern of policy makers. In this ...
Lire la suiteIntelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...
Lire la suiteIntelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...
Lire la suiteIn the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development ...
Lire la suiteThis book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, ...
Lire la suiteThis book is a comprehensive collection of chapters focusing on the core areas of computing and their further applications ...
Lire la suiteThis excellent textbook presents an introduction to the time series analysis. It provides a good source of information for ...
Lire la suiteThe International Conference on Life System Modeling and Simulation (LSMS) was formed to bring together international researchers ...
Lire la suiteThebookisbasedonseveralyearsofexperienceofbothauthorsinteaching linear models at various levels. It gives an up-to-date account ...
Lire la suiteIn this book, experts in statistics and psychometrics describe classes of linkages, the history of score linkings, data collection ...
Lire la suiteAt the system level, a novel systematic study on the full feedforward Sigma-Delta topology is presented in this book. As ...
Lire la suiteThis book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being ...
Lire la suite