Sökt på: Sökresultat
totalt 56 träffar
Exploring Image Binarization Techniques
The book focuses on an image processing technique known as binarization. It provides a comprehensive survey over existing binarization techniques for both document and graphic …
Advanced Computing and Systems for Security
This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS …
Proceedings of International Conference on Data Analytics and Insights, ICDAI 2023
The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Analytics and Insights (ICDAI 2023), organized by Techno …
Advances in Network Security and Applications
This book constitutes the proceedings of the 4th International Conference on Network Security and Applications held in Chennai, India, in July 2011. The 63 revised full papers …
Applied Computation and Security Systems
This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security …
Advances in Computer Science and Information Technology. Computer Science and Engineering
The three volume set LNICST 84 - LNICST 86 constitute the refereed proceedings ofthe Second International Conference on Computer Science and InformationTechnology, CCSIT 2012, held …
Recent Trends in Network Security and Applications
The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its applications for wired and …
Advanced Computing and Systems for Security
The book includes extended versions of selected papers discussed and presented at the 5th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2018) …
Applied Computation and Security Systems
This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security …
Proceedings of International Conference on Computational Intelligence and Data Engineering
This book is a collection of high-quality research work on cutting-edge technologies and the most-happening areas of computational intelligence and data engineering. It includes …
Business Standard Compliance and Requirements Validation Using Goal Models
This book discusses enterprise hierarchies, which view a target system with varying degrees of abstraction. These requirement refinement hierarchies can be represented by goal …
Recent Trends in Networks and Communications
The Second International Conference on Networks and Communications (NeCoM 2010), the Second International Conference on Wireless and Mobile Networks (WiMoN 2010), and the Second …