The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Lire la suite
This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Lire la suite
This book is organized in topical sections on signal analysis for characterization and filtering, analysis of shape and texture, ...
Lire la suite
QoS is an important subject which occupies a central place in overall packet network technologies. A complex subject, its ...
Lire la suite
Information security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...
Lire la suite
Quantitative economic policy and econometrics were developed along with macroeconomics in the 1930s. Econometric techniques ...
Lire la suiteDiscuss the pathophysiology of autoimmune diseases in addition to both theoretical and practical aspects of quantitative ...
Lire la suite
This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Lire la suite
This volume is composed of invited papers on learning and control. The contents form the proceedings of a workshop held in ...
Lire la suite
The theory of linear models and regression analysis plays an essential role in the development of methods for the statistical ...
Lire la suite
This book seeks to comprehensively address the face recognition problem while gaining new insights from complementary fields ...
Lire la suite
This relatively nontechnical book is the first account of the history of statistics from the Fisher revolution to the computer ...
Lire la suite
Constitutes proceedings of the Second International Conference on Rough Sets and Knowledge Technology, RSKT 2007, held in ...
Lire la suite
Routing Congestion in VLSI Circuits: Estimation and Optimization provides the reader with a complete understanding of the ...
Lire la suite
It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...
Lire la suite
Biometrics is becoming increasingly common in establishments that require high security such as state security and financial ...
Lire la suite
Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...
Lire la suite
This book is organized in topical sections on smart objects, spatial and human context inference, context processing and ...
Lire la suite
With contributions by leading scientists in the field, this book gives the first comprehensive overview of the results of ...
Lire la suite
Constitutes the refereed proceeding of the 12th European Software Process Improvement Conference, EuroSPI 2005, held in Budapest, ...
Lire la suite