l Authentication, Identification, and Signature
l Intrusion Detection
l Steganography, Data Hiding, and Watermarking
l Database, System, and Communication Security
l Computer Vision, Object Tracking, and Pattern Recognition
l Image Processing, Medical Image Processing, and Video Coding
l Digital Content, Digital Life, and Human Computer Interaction
l Parallel, Peer-to-peer, Distributed, and Cloud Computing
l Software Engineering and Programming Language
This book provides a reference to theoretical problems as well as practical solutions and applications for the state-of-the-art results in Intelligent Systems and Applications on the aforementioned topics. In particular, both the academic community (graduate students, post-doctors and faculties) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staffs and managers, security managers) will find this book interesting.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.