Language:
English
繁體中文
Help
Login
SpringerBriefs in computer science,
書目資訊
omnidirectional vision systems
omnidirectional vision systems
on the mathematics of modelling, met...
on the mathematics of modelling, metamodelling, ontologies and modelling languages
machine learning modeling for iout n...
machine learning modeling for iout networks
identification of pathogenic social ...
identification of pathogenic social media accounts
service placement in ad hoc networks
service placement in ad hoc networks
architectures of small-cell networks...
architectures of small-cell networks and interference management
concise computer mathematics
concise computer mathematics
bluetooth security attacks
bluetooth security attacks
distributed computing and monitoring...
distributed computing and monitoring technologies for older patients
decentralized reasoning in ambient i...
decentralized reasoning in ambient intelligence
vision-based pedestrian protection s...
vision-based pedestrian protection systems for intelligent vehicles /
semantic web-based intelligent geosp...
semantic web-based intelligent geospatial web services
mobile data mining
mobile data mining
data and energy integrated communica...
data and energy integrated communication networks
cyber-security threats and response models in nuclear power plants
guide to cisco routers configuration
guide to cisco routers configuration
distributed medium access control in...
distributed medium access control in wireless networks
android application security
android application security
tree-based convolutional neural networks
tree-based convolutional neural networks
construction of fundamental data str...
construction of fundamental data structures for strings
cloud portability and interoperability
cloud portability and interoperability
interpretability of computational in...
interpretability of computational intelligence-based regression models
cross-cultural multimedia computing
cross-cultural multimedia computing
cloud based 5g wireless networks
cloud based 5g wireless networks
guide to osi and tcp/ip models
guide to osi and tcp/ip models
applications of algebra to communica...
applications of algebra to communications, control, and signal processing
software fault prediction
software fault prediction
energy-efficient area coverage for i...
energy-efficient area coverage for intruder detection in sensor networks
visual pattern discovery and recognition
visual pattern discovery and recognition
ontology-based data access leveragin...
ontology-based data access leveraging subjective reports
mobile authentication
mobile authentication
querying moving objects detected by ...
querying moving objects detected by sensor networks
internet resource pricing models
internet resource pricing models
explaining algorithms using metaphors
explaining algorithms using metaphors
systems for big graph analytics
systems for big graph analytics
concepts, ontologies, and knowledge ...
concepts, ontologies, and knowledge representation
modeling and evaluating denial of se...
modeling and evaluating denial of service attacks for wireless and mobile applications
cloud based 5g wireless networks
cloud based 5g wireless networks
interactive co-segmentation of objec...
interactive co-segmentation of objects in image collections
encrypted network traffic analysis
markov models for handwriting recogn...
markov models for handwriting recognition
encrypted email
encrypted email
radio resource management using geom...
radio resource management using geometric water-filling
mobile information retrieval
mobile information retrieval
quality-aware scheduling for key-val...
quality-aware scheduling for key-value data stores
semantic web-based systems
semantic web-based systems
delay tolerant networks
delay tolerant networks
composing fisher kernels from deep n...
composing fisher kernels from deep neural models
auction based resource provisioning ...
auction based resource provisioning in cloud computing
protein homology detection through a...
protein homology detection through alignment of markov random fields
information security of highly criti...
information security of highly critical wireless networks
annual dynamics of daylight variabil...
annual dynamics of daylight variability and contrast
innovative technologies in everyday life
innovative technologies in everyday life
proof theory for description logics
proof theory for description logics
efficient algorithms for discrete wa...
efficient algorithms for discrete wavelet transform
optical flow and trajectory estimati...
optical flow and trajectory estimation methods
heterogeneous facial analysis and sy...
heterogeneous facial analysis and synthesis
spatio-temporal networks
spatio-temporal networks
data and energy integrated communica...
data and energy integrated communication networks
smartphone-based indoor map construction
smartphone-based indoor map construction
parallel scientific computing
parallel scientific computing
segmentation and separation of overl...
segmentation and separation of overlapped latent fingerprints
survey of data leakage detection and...
survey of data leakage detection and prevention solutions
deep learning: convergence to big da...
deep learning: convergence to big data analytics
cryptographic obfuscation
cryptographic obfuscation
distributed hash table
distributed hash table
efficient biometric indexing and ret...
efficient biometric indexing and retrieval techniques for large-scale systems
support vector machines and perceptrons
support vector machines and perceptrons
knowledge discovery from multi-sourced data
cross-cultural multimedia computing
cross-cultural multimedia computing
large group decision making
large group decision making
interworking of wireless lans and ce...
interworking of wireless lans and cellular networks
auction based resource provisioning ...
auction based resource provisioning in cloud computing
real-time detection of lines and grids
real-time detection of lines and grids
building secure defenses against cod...
building secure defenses against code-reuse attacks
transportation and information
transportation and information
primer of multicast routing
primer of multicast routing
cognitive virtual network operator games
cognitive virtual network operator games
practical security properties on com...
practical security properties on commodity computing platforms
greenedge: new perspectives to energy management and supply in mobile edge computing
research on modeling and using context over 25 years
intent recognition for human-machine interactions
bioinformatics techniques for drug d...
bioinformatics techniques for drug discovery
main memory management on relational database systems
edge computing
edge computing
privacy preservation in iot: machine learning approaches
parallel and distributed map merging...
parallel and distributed map merging and localization
failure-modes-based software reading
failure-modes-based software reading
big data 2.0 processing systems
big data 2.0 processing systems
link prediction in social networks
link prediction in social networks
two-dimensional change detection methods
two-dimensional change detection methods
cyber-risk management
cyber-risk management
intrusion detection for ip-based mul...
intrusion detection for ip-based multimedia communications over wireless networks
smartphone-based indoor map construction
smartphone-based indoor map construction
large scale hierarchical classificat...
large scale hierarchical classification: state of the art
culture on the edge of chaos
culture on the edge of chaos
guide to differential privacy modifications
bringing machine learning to software-defined networks
jruby rails web application development
jruby rails web application development
innovative web applications for anal...
innovative web applications for analyzing traffic operations
computational techniques for human s...
computational techniques for human smile analysis
social media audit
social media audit
guide to digital forensics
guide to digital forensics
visual and text sentiment analysis t...
visual and text sentiment analysis through hierarchical deep learning networks
automatic design of decision-tree in...
automatic design of decision-tree induction algorithms
elements of cloud computing security
elements of cloud computing security
human action recognition with depth ...
human action recognition with depth cameras
studies on urban vehicular ad-hoc ne...
studies on urban vehicular ad-hoc networks
building secure defenses against cod...
building secure defenses against code-reuse attacks
automatic design of decision-tree in...
automatic design of decision-tree induction algorithms
context management for distributed a...
context management for distributed and dynamic context-aware computing
online social media content delivery
online social media content delivery
research and development in digital ...
research and development in digital media
wireless health
wireless health
resource management for device-to-de...
resource management for device-to-device underlay communication
modeling trust context in networks
modeling trust context in networks
spatio-temporal databases
spatio-temporal databases
survey of characteristic engine feat...
survey of characteristic engine features for technology-sustained pervasive games
computational techniques for human s...
computational techniques for human smile analysis
data, information, and time
supercomputing for molecular dynamic...
supercomputing for molecular dynamics simulations
design of cloud workflow systems
design of cloud workflow systems
location privacy preservation in cog...
location privacy preservation in cognitive radio networks
network-based analysis of dynamical ...
network-based analysis of dynamical systems
scalable parallel programming applie...
scalable parallel programming applied to h.264/avc decoding
spatial auditory human-computer inte...
spatial auditory human-computer interfaces
generative methods for social media analysis
smart tv security
smart tv security
primer on quantum computing
primer on quantum computing
twitter data analytics
twitter data analytics
software fault detection and correct...
software fault detection and correction: modeling and applications
rhodes framework for android platfor...
rhodes framework for android platform and blackberry smartphones
information-theoretic evaluation for...
information-theoretic evaluation for computational biomedical ontologies
digital watermarking techniques in c...
digital watermarking techniques in curvelet and ridgelet domain
demand-driven associative classification
demand-driven associative classification
from opinion mining to financial arg...
from opinion mining to financial argument mining
variational regularization of 3d data
variational regularization of 3d data
group cell architecture for cooperat...
group cell architecture for cooperative communications
semantic web-based systems
semantic web-based systems
matrix and tensor factorization tech...
matrix and tensor factorization techniques for recommender systems
parallel computing hits the power wall
parallel computing hits the power wall
lora localization
traceback and anonymity
traceback and anonymity
neuro symbolic reasoning and learning
culture on the edge of chaos
culture on the edge of chaos
survey on 3d cameras: metrological c...
survey on 3d cameras: metrological comparison of time-of-flight, structured-light and active stereoscopy technologies
seamless and secure communications o...
seamless and secure communications over heterogeneous wireless networks
local image descriptor
local image descriptor
mobile edge caching in heterogeneous vehicular networks
spatial network data
spatial network data
real-time & stream data management
real-time & stream data management
operators for similarity search
operators for similarity search
understanding high-dimensional spaces
understanding high-dimensional spaces
robust network compressive sensing
cohesive subgraph search over large heterogeneous information networks
primer on generative adversarial networks
target detection and tracking by bio...
target detection and tracking by bionanosensor networks
internet video data streaming
internet video data streaming
fault prediction modeling for the pr...
fault prediction modeling for the prediction of number of software faults
sublinear algorithms for big data ap...
sublinear algorithms for big data applications
hidden treasures in contemporary rna...
hidden treasures in contemporary rna sequencing
deep neural networks in a mathematic...
deep neural networks in a mathematical framework
ontology-based procedural modelling ...
ontology-based procedural modelling of traversable buildings composed by arbitrary shapes
machine learning for cybersecurity
sentiment analysis for ptsd signals
sentiment analysis for ptsd signals
exploring the use of eye gaze contro...
exploring the use of eye gaze controlled interfaces in automotive environments
blockchain-based internet of things
research and development in art, des...
research and development in art, design and creativity
mobile data mining
mobile data mining
guide to programming for the digital...
guide to programming for the digital humanities
redescription mining
redescription mining
linear network error correction coding
linear network error correction coding
software sourcing in the age of open
software sourcing in the age of open
survey of fractal dimensions of networks
survey of fractal dimensions of networks
computational methods for processing...
computational methods for processing and analysis of biological pathways
primer on quantum computing
primer on quantum computing
software defined systems
software defined systems
qos prediction in cloud and service ...
qos prediction in cloud and service computing
modeling and analysis of voice and d...
modeling and analysis of voice and data in cognitive radio networks
understanding modern dive computers ...
understanding modern dive computers and operation
contrario line segment detection
contrario line segment detection
software testing in the cloud
software testing in the cloud
brief history of cryptology and cryp...
brief history of cryptology and cryptographic algorithms
experience with technology
experience with technology
data mining techniques in sensor net...
data mining techniques in sensor networks
time-of-flight cameras
time-of-flight cameras
sublinear algorithms for big data ap...
sublinear algorithms for big data applications
spatio-temporal data streams
spatio-temporal data streams
resource allocation for software def...
resource allocation for software defined networks
speech-to-speech translation
speech-to-speech translation
security for multi-hop wireless networks
security for multi-hop wireless networks
voice over ip security
voice over ip security
image quality assessment of computer...
image quality assessment of computer-generated images
attachment transmission in wireless ...
attachment transmission in wireless networks
data science careers, training, and ...
data science careers, training, and hiring
multimedia qoe evaluation
multimedia qoe evaluation
devops for airborne software
physical play and children’s digital...
physical play and children’s digital games
understanding modern dive computers ...
understanding modern dive computers and operation
robust motion detection in real-life...
robust motion detection in real-life scenarios
large group decision making
large group decision making
countering brandjacking in the digit...
countering brandjacking in the digital age
non-orthogonal multiple access for m...
non-orthogonal multiple access for massive connectivity
sustainable wireless networks
sustainable wireless networks
elements of cloud storage security
elements of cloud storage security
interpretability of computational in...
interpretability of computational intelligence-based regression models
autonomic cooperative networking
autonomic cooperative networking
rfid as an infrastructure
rfid as an infrastructure
digital watermarking techniques in c...
digital watermarking techniques in curvelet and ridgelet domain
innovative web applications for anal...
innovative web applications for analyzing traffic operations
real time deforestation detection us...
real time deforestation detection using ann and satellite images
advances, applications and the future of haptic technology
mobility data-driven urban traffic m...
mobility data-driven urban traffic monitoring
web proxy cache replacement strategies
web proxy cache replacement strategies
collaborative web hosting
collaborative web hosting
security and privacy in mobile secur...
security and privacy in mobile security networks
secure ip mobility management for vanet
secure ip mobility management for vanet
data center networks
data center networks
user-defined tensor data analysis
user-defined tensor data analysis
exploring the use of eye gaze contro...
exploring the use of eye gaze controlled interfaces in automotive environments
state of the art in digital media an...
state of the art in digital media and applications
amazing journey of reason
amazing journey of reason
ai-enabled spectrum sharing
local image descriptor: modern appro...
local image descriptor: modern approaches
point-of-interest recommendation in ...
point-of-interest recommendation in location-based social networks
security assessment in vehicular net...
security assessment in vehicular networks
routing for wireless multi-hop networks
routing for wireless multi-hop networks
elements of cloud storage security
elements of cloud storage security
itil 2011 at a glance
itil 2011 at a glance
data-driven generation of policies
data-driven generation of policies
bootstrapping trust in modern computers
bootstrapping trust in modern computers
traffic-sign recognition systems
traffic-sign recognition systems
software similarity and classification
software similarity and classification
transforming the it services lifecyc...
transforming the it services lifecycle with ai technologies
research and development in art, des...
research and development in art, design and creativity
fundamental computing forensics for ...
fundamental computing forensics for africa
automatic malware analysis
automatic malware analysis
security for wireless implantable me...
security for wireless implantable medical devices
fundamental computing forensics for ...
fundamental computing forensics for africa
spatial auditory human-computer inte...
spatial auditory human-computer interfaces
motion history images for action rec...
motion history images for action recognition and understanding
generalized jeffrey conditionalization
generalized jeffrey conditionalization
physical layer security in random ce...
physical layer security in random cellular networks
software fault prediction
software fault prediction
discriminative pattern discovery on ...
discriminative pattern discovery on biological networks
enhanced building information models
enhanced building information models
energy-efficient high performance co...
energy-efficient high performance computing
crowd-powered mobile computing and s...
crowd-powered mobile computing and smart things
amplify-and-forward relaying in wire...
amplify-and-forward relaying in wireless communications
parallel and distributed map merging...
parallel and distributed map merging and localization
art, design and technology
art, design and technology
automated software and service compo...
automated software and service composition
graph-based clustering and data visu...
graph-based clustering and data visualization algorithms /
wireless virtualization
wireless virtualization
facial kinship verification
facial kinship verification
protein homology detection through a...
protein homology detection through alignment of markov random fields
link prediction in social networks
link prediction in social networks
mobile web browsing using the cloud
mobile web browsing using the cloud
physical play and children's digital...
physical play and children's digital games
guide to ildjit
guide to ildjit
recurrent neural networks for short-...
recurrent neural networks for short-term load forecasting
mining lurkers in online social networks
mining lurkers in online social networks
spatio-temporal recommendation in so...
spatio-temporal recommendation in social media
deep learning in solar astronomy
feedback arc set
repairing and querying databases und...
repairing and querying databases under aggregate constraints
interrupt handling schemes in operat...
interrupt handling schemes in operating systems
domain-specific knowledge graph cons...
domain-specific knowledge graph construction
network hardening
network hardening
energy-aware scheduling on multiproc...
energy-aware scheduling on multiprocessor platforms
support vector machines and perceptrons
support vector machines and perceptrons
universal time-series forecasting wi...
universal time-series forecasting with mixture predictors
glazed panel construction with human...
glazed panel construction with human-robot cooperation
distributed denial of service attack...
distributed denial of service attack and defense
distributed space-time coding
distributed space-time coding
secure and trustworthy transportatio...
secure and trustworthy transportation cyber-physical systems
iot supply chain security risk analysis and mitigation
encrypted email
encrypted email
privately and publicly verifiable co...
privately and publicly verifiable computing techniques
vision-based pedestrian protection s...
vision-based pedestrian protection systems for intelligent vehicles
innovative technologies in everyday life
innovative technologies in everyday life
cooperative networking in a heteroge...
cooperative networking in a heterogeneous wireless medium
automated configuration problem solving
automated configuration problem solving
introduction to image processing using r
introduction to image processing using r
location privacy protection in mobil...
location privacy protection in mobile networks
elements of cloud computing security
elements of cloud computing security
resource management for internet of ...
resource management for internet of things
enhanced building information models
enhanced building information models
optical flow and trajectory estimati...
optical flow and trajectory estimation methods
software fault detection and correction
software fault detection and correction
survey of fractal dimensions of networks
survey of fractal dimensions of networks
edge computing: a primer
edge computing: a primer
dynamic cloud collaboration platform
dynamic cloud collaboration platform
health informatics in the cloud
health informatics in the cloud
chronicles
enabling secure and privacy preservi...
enabling secure and privacy preserving communications in smart grids
compilation for secure multi-party c...
compilation for secure multi-party computation
modeling and simulating command and ...
modeling and simulating command and control
ontology-based procedural modelling ...
ontology-based procedural modelling of traversable buildings composed by arbitrary shapes
spatiotemporal frequent pattern mini...
spatiotemporal frequent pattern mining from evolving region trajectories
point-of-interest recommendation in ...
point-of-interest recommendation in location-based social networks
spatial autoregression (sar) model
spatial autoregression (sar) model
homomorphic signature schemes
homomorphic signature schemes
digital image processing: practical ...
digital image processing: practical approach
markov decision processes and the be...
markov decision processes and the belief-desire-intention model
distributed computing and monitoring...
distributed computing and monitoring technologies for older patients
wifi signal-based user authentication
spatiotemporal frequent pattern mini...
spatiotemporal frequent pattern mining from evolving region trajectories
turbo message passing algorithms for...
turbo message passing algorithms for structured signal recovery
guide to programming for the digital...
guide to programming for the digital humanities
interrupt handling schemes in operat...
interrupt handling schemes in operating systems
two bit circus and the future of ent...
two bit circus and the future of entertainment
android application security
android application security
mining lurkers in online social networks
mining lurkers in online social networks
mac protocols for cyber-physical systems
mac protocols for cyber-physical systems
leakage resilient password systems
leakage resilient password systems
image processing and computer vision...
image processing and computer vision in ios
document layout analysis
sustainable web ecosystem design
sustainable web ecosystem design
bioinformatics techniques for drug d...
bioinformatics techniques for drug discovery
self-* and p2p for network management
self-* and p2p for network management
data science careers, training, and ...
data science careers, training, and hiring
data mining in large sets of complex...
data mining in large sets of complex data
deep neural networks in a mathematic...
deep neural networks in a mathematical framework
introduction to distance geometry ap...
introduction to distance geometry applied to molecular geometry
spatial network data
spatial network data
smart tv security
smart tv security
diffusion in social networks
diffusion in social networks
diffusion in social networks
diffusion in social networks
latency optimization in interactive multimedia streaming
composing fisher kernels from deep n...
composing fisher kernels from deep neural models
spatio-temporal data streams
spatio-temporal data streams
transforming the it services lifecyc...
transforming the it services lifecycle with ai technologies
low resource social media text mining
low resource social media text mining
fitting splines to a parametric function
fitting splines to a parametric function
mission-critical application driven ...
mission-critical application driven intelligent maritime networks
edge computing resilience
rapid serial visual presentation
rapid serial visual presentation
open problems in spectral dimensiona...
open problems in spectral dimensionality reduction
trustworthy execution on mobile devices
trustworthy execution on mobile devices
wireless health
wireless health
foundations of blockchain
foundations of blockchain
belief revision in non-classical logics
belief revision in non-classical logics
network robustness under large-scale...
network robustness under large-scale attacks
matrix and tensor factorization tech...
matrix and tensor factorization techniques for recommender systems
general framework for reasoning on i...
general framework for reasoning on inconsistency
fast compact algorithms and software...
fast compact algorithms and software for spline smoothing
tree-based convolutional neural networks
tree-based convolutional neural networks
video processing in the cloud
video processing in the cloud
middleware solutions for the interne...
middleware solutions for the internet of things
survey on 3d cameras
survey on 3d cameras
energy detection for spectrum sensin...
energy detection for spectrum sensing in cognitive radio
evolutionary game design
evolutionary game design
secure multi-party e-commerce protocols
latent factor analysis for high-dimensional and sparse matrices
data dissemination and query in mobi...
data dissemination and query in mobile social networks
online social media content delivery
online social media content delivery
robot control and calibration
large scale hierarchical classification
large scale hierarchical classification
artificial intelligence tools for cy...
artificial intelligence tools for cyber attribution
physical layer approaches for securi...
physical layer approaches for securing wireless communication systems
research and development in the acad...
research and development in the academy, creative industries and applications
fraud prevention in online digital a...
fraud prevention in online digital advertising
big data 2.0 processing systems
big data 2.0 processing systems
entropy guided transformation learning
entropy guided transformation learning
survey of core research in informati...
survey of core research in information systems
graph-based clustering and data visu...
graph-based clustering and data visualization algorithms
context-aware collaborative prediction
context-aware collaborative prediction
resource management in utility and c...
resource management in utility and cloud computing
cyber-risk management
cyber-risk management
quantum algorithms for cryptographic...
quantum algorithms for cryptographically significant boolean functions
on the construction of engineering h...
on the construction of engineering handbooks
modeling and evaluating denial of se...
modeling and evaluating denial of service attacks for wireless and mobile applications
physical layer security in random ce...
physical layer security in random cellular networks
event-driven surveillance
event-driven surveillance
power distribution and performance a...
power distribution and performance analysis for wireless communication networks
android malware
android malware
security-aware cooperation in cognit...
security-aware cooperation in cognitive radio networks
combinatorial testing in cloud computing
combinatorial testing in cloud computing
lossy image compression
lossy image compression
from fault classification to fault t...
from fault classification to fault tolerance for multi-agent systems
syntactic n-grams in computational l...
syntactic n-grams in computational linguistics
4g femtocells
4g femtocells
digital image processing
digital image processing
thread and data mapping for multicor...
thread and data mapping for multicore systems
traceback and anonymity
traceback and anonymity
deep learning to see
thread and data mapping for multicor...
thread and data mapping for multicore systems
unsupervised information extraction ...
unsupervised information extraction by text segmentation
image quality assessment of computer...
image quality assessment of computer-generated images
deep learning in mining of visual co...
deep learning in mining of visual content
guide to modeling and simulation of ...
guide to modeling and simulation of systems of systems of systems
automated software and service compo...
automated software and service composition
operators for similarity search
operators for similarity search
target detection and tracking by bio...
target detection and tracking by bionanosensor networks
performance evaluation software
performance evaluation software
asymptotic nonparametric statistical...
asymptotic nonparametric statistical analysis of stationary time series
security for cloud storage systems
security for cloud storage systems
integrating 3d modeling, photogramme...
integrating 3d modeling, photogrammetry and design
cyber security
cyber security
homomorphic signature schemes
homomorphic signature schemes
two bit circus and the future of ent...
two bit circus and the future of entertainment
spatio-temporal recommendation in so...
spatio-temporal recommendation in social media
intermittently connected mobile ad h...
intermittently connected mobile ad hoc networks
preference query analysis and optimi...
preference query analysis and optimization
multi-spectral and intelligent sensing
Processing
...
Change password
Login