The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
Lire la suiteThis inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
Lire la suiteThis second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
Lire la suiteThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Lire la suiteEvery now and then, a good book comes along and quite rightfully makes itself a distinguished place amongthe existing books ...
Lire la suiteincluding our own. By reconstructing the theoretical framework of transmedial narration, this book enables the inclusion ...
Lire la suiteWritten for the non-specialist seeking an authoritative but accessible overview of this interdisciplinary field, True Visions ...
Lire la suiteThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Lire la suiteThe volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
Lire la suiteThis book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...
Lire la suiteThe book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...
Lire la suite“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
Lire la suiteThis volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...
Lire la suiteThe book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...
Lire la suiteTurbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...
Lire la suiteThis book presents a series of models in the general area of cell physiology and signal transduction, with particular attention ...
Lire la suiteFabian Pfaffenberger evaluates the scientific usefulness of Twitter by considering several common survey and analysis methods. ...
Lire la suiteInterference determines the performance of UMTS radio networks. In order to provide good coverage and high capacity, network ...
Lire la suiteConstitutes the refereed proceedings of the 7th International Conference on Ubiquitous Computing, UbiComp 2005, held in Japan ...
Lire la suiteThis book constitutes the refereed proceedings of the 8th International Conference on Ubiquitous Computing, UbiComp 2006. ...
Lire la suite