Home | Amazing | Today | Tags | Publishers | Years | Search 
Data Analysis, Machine Learning and Applications: Proceedings
Data Analysis, Machine Learning and Applications: Proceedings
Data analysis and machine learning are research areas at the intersection of computer science, artificial intelligence, mathematics and statistics. They cover general methods and techniques that can be applied to a vast set of applications such as web and text mining, marketing, medical science, bioinformatics and business intelligence. This volume...
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security (Mathematics and Visualization)
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are...
Finite Automata and Application to Cryptography
Finite Automata and Application to Cryptography
Finite Automata and Application to Cryptography mainly deals with the invertibility theory of finite automata and its application to cryptography. In addition, autonomous finite automata and Latin arrays, which are relative to the canonical form for one-key cryptosystems based on finite automata, are also discussed.

Finite automata are...

Combinatorial Image Analysis: 12th International Workshop, IWCIA 2008, Buffalo, NY, USA, April 7-9, 2008, Proceedings
Combinatorial Image Analysis: 12th International Workshop, IWCIA 2008, Buffalo, NY, USA, April 7-9, 2008, Proceedings
This volume constitutes the refereed proceedings of the 12th International Workshop on Combinatorial Image Analysis, IWCIA 2008, held in Buffalo, NY, USA, in April 2008.

The 28 revised full papers and 10 revised poster papers presented were carefully reviewed and selected from 117 initial submissions. The papers are organized in topical...

Computational Intelligence: A Compendium (Studies in Computational Intelligence)
Computational Intelligence: A Compendium (Studies in Computational Intelligence)

Computational Intelligence: A Compendium presents a well structured overview about this rapidly growing field with contributions from leading experts in Computational Intelligence. The main focus of the compendium is on applied methods, tried-and-proven as being effective to realworld problems, which is especially useful for practitioners,...

Usability of Speech Dialog Systems: Listening to the Target Audience (Signals and Communication Technology)
Usability of Speech Dialog Systems: Listening to the Target Audience (Signals and Communication Technology)
Many technical issues like speech recognition and signal processing have to be addressed for the design of speech communication systems. However, before designing a speech application starts, 3 key questions that have to be answered: who will use it, why and how often? Only if the designer is clear about these questions, he is able to provide a...
Multimodal User Interfaces: From Signals to Interaction (Signals and Communication Technology)
Multimodal User Interfaces: From Signals to Interaction (Signals and Communication Technology)
Human interfacing with the environment and with other humans is undoubtedly, fully multimodal. All human senses participate, even if some of then dominate, to the everyday human operations of perception, action and interaction. Interaction with the computer or computer-mediated interaction with others has been based for decades in a limited set of...
Bioinformatics and Systems Biology: Collaborative Research and Resources
Bioinformatics and Systems Biology: Collaborative Research and Resources
Collaborative research in bioinformatics and systems biology is a key element of modern biology and health research. This book highlights and provides access to many of the methods, environments, results and resources involved, including integral laboratory data generation and experimentation and clinical activities. Collaborative projects embody a...
Andrology: Male Reproductive Health and Dysfunction
Andrology: Male Reproductive Health and Dysfunction

This is the 3rd, totally revised edition of a well-known textbook that continues to represent the gold standard in the literature on clinical andrology. It examines in depth all aspects of male reproductive health, encompassing the basic physiology of male reproductive function and a wide range of disorders. Each of the chapters is...

Relativistic Collisions of Structured Atomic Particles (Springer Series on Atomic, Optical, and Plasma Physics)
Relativistic Collisions of Structured Atomic Particles (Springer Series on Atomic, Optical, and Plasma Physics)
The book reviews the progress achieved over the last decade in the study of collisions between an ion and an atom in which both the atomic particles carry electrons and can undergo transitions between their internal states - including continua. It presents the detailed considerations of different theoretical approaches that can be used to describe...
Public Key Cryptography  PKC 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, Proceedings
Public Key Cryptography PKC 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008, Proceedings
These are the Proceedings of the 11th International Workshop on Practice and Theory in Public Key Cryptography – PKC 2008. The workshop was held in Barcelona, Spain, March 9–12, 2008.

It was sponsored by the International Association for Cryptologic Research (IACR; see www.iacr.org), this year in cooperation with MAK, the
...
Security in Computing Systems: Challenges, Approaches and Solutions
Security in Computing Systems: Challenges, Approaches and Solutions

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of secu rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing sys tems,...

Result Page: Previous 3241 3242 3243 3244 3245 3246 3247 3248 3249 3250 3251 3252 3253 3254 3255 3256 3257 3258 3259 3260 3261 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy