Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Security in the 21st Century
Computer Security in the 21st Century

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include...

Spoken Language Processing: A Guide to Theory, Algorithm and System Development
Spoken Language Processing: A Guide to Theory, Algorithm and System Development
Our primary motivation in writing this book is to share our working experience to bridge the gap between the knowledge of industry gurus and newcomers to the spoken language processing community. Many powerful techniques hide in conference proceedings and academic papers for years before becoming widely recognized by the research community or the...
Information Systems Development: Advances in Theory, Practice, and Education
Information Systems Development: Advances in Theory, Practice, and Education
This volume is comprised of the proceedings of the 13th International Conference on Information Systems Development held August 26th-28th, 2004, at Vilnius Gediminas Technical University, Vilnius, Lithuania. The aim of this volume is to provide a forum for the research and practices addressing current issues associated with Information Systems...
Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the...
Joint Source-Channel Decoding: A Cross-Layer Perspective with Applications in Video Broadcasting
Joint Source-Channel Decoding: A Cross-Layer Perspective with Applications in Video Broadcasting

Traditionally, cross-layer and joint source-channel coding were seen as incompatible with classically structured networks but recent advances in theory changed this situation. Joint source-channel decoding is now seen as a viable alternative to separate decoding of source and channel codes, if the protocol layers are taken into account. A...

Graph-Theoretic Concepts in Computer Science: 37th International Workshop, WG 2011
Graph-Theoretic Concepts in Computer Science: 37th International Workshop, WG 2011

The 37th International Workshop on Graph-Theoretic Concepts in Computer Science (WG 2011) took place in Tepl´a Monastery, Czech Republic, during June 21–24, 2011. It was attended by 80 participants who came from all over the world not only to deliver or listen to interesting talks, but also to celebrate the 65th birthday of Ludek...

Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 1 (Advances in Intelligent Systems and Computing)
Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 1 (Advances in Intelligent Systems and Computing)

This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018) held at the University of Engineering & Management, Kolkata, India, on February 23–25, 2018. It comprises high-quality research work by academicians and industrial...

Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services.
Addressing this security issue, this volume is divided into eleven parts covering the essentials of information security technologies,
...
Systems Modeling and Simulation: Theory and Applications, Asian Simulation Conference 2006
Systems Modeling and Simulation: Theory and Applications, Asian Simulation Conference 2006
The Asia Simulation Conference 2006 (JSST 2006) was aimed at exploring challenges in methodologies for modeling, control and computation in simulation, and their applications in social, economic, and financial fields as well as established scientific and engineering solutions. The conference was held in Tokyo from October 30 to November 1, 2006,...
Mathematical Methods in Computer Science: Essays in Memory of Thomas Beth
Mathematical Methods in Computer Science: Essays in Memory of Thomas Beth
This Festschrift volume contains the proceedings of the conference Mathematical Methods in Computer Science, MMICS 2008, which was held during December 17-19, 2008, in Karlsruhe, Germany, in memory of Thomas Beth.

The themes of the conference reflected the many interests of Thomas Beth. Although, these interests might seem diverse, mathematical...

Beginning iOS Game Development (Wrox Programmer to Programmer)
Beginning iOS Game Development (Wrox Programmer to Programmer)
IOS DEVICES PROVIDE DEVELOPERS with a unique and exciting platform for making games. The iPhone gives gamers a tiny computer in their pocket that they have with them all the time. The iPad provides a similar gameplay experience but with a larger screen, more processing power, and more memory. The devices allow for unique control...
An Introduction to Numerical Analysis for Electrical and Computer Engineers
An Introduction to Numerical Analysis for Electrical and Computer Engineers
An engineer’s guide to numerical analysis

To properly function in today’s work environment, engineers require a working familiarity with numerical analysis. This book provides that necessary background, striking a balance between analytical rigor and an applied approach focusing on methods particular to the solving of engineering...

unlimited object storage image
Result Page: 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy