 |
|
 Digital Watermarking for Digital MediaDigital media, like audio, video, images, and other multimedia documents, can be protected against copyright infringements with invisible, integrated patterns. Such methods are based on steganography and digital watermarking techniques. Most watermarks are inserted as a plain-bit or adjusted digital signal using a key-based embedding algorithm. The... |  |  Implicit Objects Computer GraphicsImplicit definition and description of geometric objects and surfaces plays a critical role in the appearance and manipulation of computer graphics. In addition, the mathematical definition of shapes, using an implicit form, has pivotal applications for geometric modeling, visualization and animation. Until recently, the parametric form has been... |  |  Application of Agents and Intelligent Information TechnologiesThe Web has sparked renewed interest in developing intelligent information systems that enable users to accomplish complex tasks in Web-centric environments with relative ease. Although artificially intelligent (AI) technologies such as expert systems and neural networks have been successfully used in aerospace, communication, medical, and... |
|
|
 Cryptography for Internet & Database ApplicationsCryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest... |  |  |  |  Introduction to Computational Biology: An Evolutionary ApproachIn 1982, the first release of the GenBank sequence database contained 601,438 residues. By 2005, this number had grown beyond and continues to increase exponentially. Far from regarding this as “information overload”, we believe the free availability of so much precise and fundamental data on the ultimate constituents of life to be the... |
|
 Biometrics, Computer Security Systems and Artificial Intelligence ApplicationsThis book presents the most recent achievements in the field of a very fast developing Computer Science. It is a very fascinating science, which still encompasses a number of uncovered areas of study with urgent problems to be solved. Therefore, thousands of scientists are dealing with it elaborating on more and more practical and efficient... |  |  Computational Text Analysis: For Functional Genomics and BioinformaticsThis book brings together the two disparate worlds of computational text analysis and biology and presents some of the latest methods and applications to proteomics, sequence analysis, and gene expression data. Modern genomics generates large and comprehensive data sets but their interpretation requires an understanding of a vast number of genes,... |  |  An Introduction to Quantum ComputingThis concise, accessible text provides a thorough introduction to quantum computing - an exciting emergent field at the interface of the computer, engineering, mathematical and physical sciences. Aimed at advanced undergraduate and beginning graduate students in these disciplines, the text is technically detailed and is clearly illustrated... |
|
Result Page: 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 |