Home | Amazing | Today | Tags | Publishers | Years | Search 
Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference
Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference

The world of the twenty-first century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification is growing, not only in companies and organizations, but also in the world at large.

Identity management is put...

Computer Forensics: A Pocket Guide
Computer Forensics: A Pocket Guide

Computer forensics has become an essential tool in the identification of misuse and abuse of systems. Whilst widely utilised within law enforcement, the rate of adoption by organisations has been somewhat slower, with many organisations focusing upon the traditional security countermeasures to prevent an attack from occurring in the first...

Image and Video Processing in the Compressed Domain
Image and Video Processing in the Compressed Domain

With more and more images and videos being available in the compressed format, researchers have started taking interest in the aspect of designing algorithms for different image operations directly in their domains of representation. This would not only avoid the inverse and forward transformation steps and potentially make the...

Evolving Intelligent Systems: Methodology and Applications (IEEE Press Series on Computational Intelligence)
Evolving Intelligent Systems: Methodology and Applications (IEEE Press Series on Computational Intelligence)

One of the consequences of the information revolution is the ever-growing amount of
information we are surrounded with and the need to process this information
efficiently and extract meaningful knowledge. This phenomenon was termed “digital
obesity” or “information obesity” by Toshiba Ltd. One
...

Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management
Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management

The Internet already is the broadest and most used source of legal information: in the web one can find most statutory texts (all in some jurisdictions), a vast amount of case law, huge repertoires of doctrinal contributions, many blogs and fora discussing different legal issues. Moreover, as legal activities (legislative,...

Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing
Simulated Annealing and Boltzmann Machines: A Stochastic Approach to Combinatorial Optimization and Neural Computing

Wiley-Interscience Series in Discrete Mathematics and Optimization Advisory Editors Ronald L. Graham Jan Karel Lenstra Robert E. Tarjan Discrete Mathematics and Optimization involves the study of finite structures. It is one of the fastest growing areas in mathematics today. The level and depth of recent advances in the area and the wide...

Knowledge-Based Intelligent System Advancements: Systemic and Cybernetic Approaches
Knowledge-Based Intelligent System Advancements: Systemic and Cybernetic Approaches

Since the first part of the twentieth century, cybernetics and systems research have been developed as scientific disciplines. Investigations, launched in the area of cybernetics, previously dealt with control and information processing. In a more narrow sense, they consisted in the consideration of analogies of the control and the...

Machine Learning and Statistical Modeling Approaches to Image Retrieval (The Information Retrieval Series)
Machine Learning and Statistical Modeling Approaches to Image Retrieval (The Information Retrieval Series)

In the early 1990s, the establishment of the Internet brought forth a revolutionary viewpoint of information storage, distribution, and processing: the World-Wide Web is becoming an enormous and expanding distributed digital library. Along with the development of the Web, image indexing and retrieval have grown into research areas...

Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)
Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)

Event-based distributed systems are playing an ever increasing role in areas such as enterprise management, information dissemination, finance, environmental monitoring and geo-spatial systems. Event-based processing originated with the introduction of Event-Condition-Action (ECA) rules to database systems in the 1980s. Since then,...

Bioinformatics Basics: Applications in Biological Science and Medicine
Bioinformatics Basics: Applications in Biological Science and Medicine

Scientists in the throes of research use an extensive data bank to access structural information on proteins and nucleic acids. Meanwhile, geneticists use a highly specialized form of software to analyze the hybridization pattern of DNA chips. The past decade has been tremendously successful for biotechnology and pharmaceutical...

Analytical Characterization of Aluminum, Steel, and Superalloys
Analytical Characterization of Aluminum, Steel, and Superalloys

The Analytical Characterization of Aluminum, Steel, and Superalloys addresses the needs of the practicing materials scientist and engineer, whether in an industrial or university setting, and the advanced student. This handbook provides a fundamental overview of a wide range of characterization methodologies and does not provide an...

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy