Electronic Books

Total Books: 121 - 140 /224
Image Analysis and Recognition : 5th International Conference, ICIAR 2008, Póvoa de Varzim, Portugal, June 25-27, 2008. Proceedings

The 110 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 226 submissions. ...

Lire la suite
Image and Signal Processing : 3rd International Conference, ICISP 2008. Cherbourg-Octeville, France, July 1 - 3, 2008. Proceedings

This book constitutes the refereed proceedings of the Third International Conference on Image and Signal Processing, ICISP ...

Lire la suite
Inference in Hidden Markov Models

This book is a comprehensive treatment of inference for hidden Markov models, including both algorithms and statistical theory. ...

Lire la suite
Information Security Applications

Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...

Lire la suite
Information Security and Cryptology - ICISC 2005

This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...

Lire la suite
Information Security and Cryptology – ICISC 2006

This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...

Lire la suite
Information Security and Privacy

The book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...

Lire la suite
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

Lire la suite
Innovation and Firm Performance

The process of firms’ growth – in terms of productivity or employment – is a major concern of policy makers. In this ...

Lire la suite
Intelligence and Security Informatics (vol. # 3495)

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...

Lire la suite
Intelligence and Security Informatics (vol. # 3917)

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...

Lire la suite
Intelligence and Security Informatics (vol. # 3975)

In the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development ...

Lire la suite
Intelligence and Security Informatics : First European Conference, EuroISI 2008, Esbjerg, Denmark, December 3-5, 2008. Proceedings

This book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, ...

Lire la suite
Intelligent Computing ; Proceedings of the 2021 Computing Conference, Volume 1

This book is a comprehensive collection of chapters focusing on the core areas of computing and their further applications ...

Lire la suite
Introduction to Modern Time Series Analysis

This excellent textbook presents an introduction to the time series analysis. It provides a good source of information for ...

Lire la suite
Life System Modeling and Simulation

The International Conference on Life System Modeling and Simulation (LSMS) was formed to bring together international researchers ...

Lire la suite
Linear Models and Generalizations: Least Squares and Alternatives

Thebookisbasedonseveralyearsofexperienceofbothauthorsinteaching linear models at various levels. It gives an up-to-date account ...

Lire la suite
Linking and Aligning Scores and Scales

In this book, experts in statistics and psychometrics describe classes of linkages, the history of score linkings, data collection ...

Lire la suite
Low-Power Low-Voltage Sigma-Delta Modulators in Nanometer CMOS

At the system level, a novel systematic study on the full feedforward Sigma-Delta topology is presented in this book. As ...

Lire la suite
Machine Learning Approaches in Cyber Security Analytics

This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being ...

Lire la suite
Total Books: 121 - 140 /224