The first three papers describe the applicability of bio-inspired techniques in the technical domain of computing and communication. ...
Lire la suiteThis inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...
Lire la suiteThe first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
Lire la suiteTransactions on HiPEAC is a new journal which aims at the timely dissemination of research contributions in computer architecture ...
Lire la suiteInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Lire la suiteThis volume addresses the demand for theories and applications of intelligent systems and computer engineering to meet the ...
Lire la suiteTrend in Neural Computation includes twenty chapters either contributed from leading experts or formed by extending well ...
Lire la suiteThis book is entirely about triangulations. With emphasis on computational issues, we present the basic theory necessary ...
Lire la suiteThis book constitutes the thoroughly refereed post-proceedings of the Second Symposium on Trustworthy Global Computing, TGC ...
Lire la suiteA major focus of Turbo-like Codes is on high speed turbo decoding, which targets applications with data rates of several ...
Lire la suiteThe primary purpose of TUTORIALS ON EMERGING METHODOLOGIES AND APPLICATIONS IN OPERATIONS RESEARCH is to provide a reference ...
Lire la suiteThis book describes new methods for building intelligent systems using type-2 fuzzy logic and soft computing techniques. ...
Lire la suiteThe 7th International Conference on Typed Lambda Calculi and Applications (TLCA 2005) was held in Nara (Japan) from 21 to ...
Lire la suiteThe refereed post-proceedings of the International Workshop of the Types Working Group are presented in this volume. The ...
Lire la suiteThe topic of this book was formal reasoning and computer programming based on type theory. Great importance was attached ...
Lire la suiteOver recent years most business processes have changed in various dimensions (e. g. , ?exibility, interconnectivity, coordination ...
Lire la suiteThis volume provides a comprehensive view of unconstrained face recognition, especially face recognition from multiple still ...
Lire la suiteThis book constitutes the refereed proceedings of the Sixth International Conference on Unconventional Computation, UC 2007,organized ...
Lire la suiteThe Fourth International Conference on Unconventional Computation, UC 2005, organized under the auspices of EATCS by the ...
Lire la suiteThis book about The 5th International Conference on Unconventional Computation, UC 2006,organized under the auspices of the ...
Lire la suite