SpringerBriefs in computer science,

書目資訊

omnidirectional vision systems
machine learning modeling for iout n...
identification of pathogenic social ...
service placement in ad hoc networks
concise computer mathematics
bluetooth security attacks
decentralized reasoning in ambient i...
semantic web-based intelligent geosp...
mobile data mining
data and energy integrated communica...
guide to cisco routers configuration
distributed medium access control in...
android application security
tree-based convolutional neural networks
construction of fundamental data str...
cloud portability and interoperability
cross-cultural multimedia computing
cloud based 5g wireless networks
guide to osi and tcp/ip models
software fault prediction
visual pattern discovery and recognition
ontology-based data access leveragin...
mobile authentication
querying moving objects detected by ...
internet resource pricing models
explaining algorithms using metaphors
systems for big graph analytics
concepts, ontologies, and knowledge ...
cloud based 5g wireless networks
markov models for handwriting recogn...
encrypted email
radio resource management using geom...
mobile information retrieval
quality-aware scheduling for key-val...
semantic web-based systems
delay tolerant networks
composing fisher kernels from deep n...
auction based resource provisioning ...
information security of highly criti...
annual dynamics of daylight variabil...
innovative technologies in everyday life
proof theory for description logics
efficient algorithms for discrete wa...
optical flow and trajectory estimati...
heterogeneous facial analysis and sy...
spatio-temporal networks
data and energy integrated communica...
smartphone-based indoor map construction
parallel scientific computing
survey of data leakage detection and...
deep learning: convergence to big da...
cryptographic obfuscation
distributed hash table
support vector machines and perceptrons
cross-cultural multimedia computing
large group decision making
interworking of wireless lans and ce...
auction based resource provisioning ...
real-time detection of lines and grids
building secure defenses against cod...
transportation and information
primer of multicast routing
cognitive virtual network operator games
bioinformatics techniques for drug d...
edge computing
parallel and distributed map merging...
failure-modes-based software reading
big data 2.0 processing systems
link prediction in social networks
two-dimensional change detection methods
cyber-risk management
smartphone-based indoor map construction
large scale hierarchical classificat...
culture on the edge of chaos
jruby rails web application development
computational techniques for human s...
social media audit
guide to digital forensics
automatic design of decision-tree in...
elements of cloud computing security
human action recognition with depth ...
studies on urban vehicular ad-hoc ne...
building secure defenses against cod...
automatic design of decision-tree in...
online social media content delivery
research and development in digital ...
wireless health
modeling trust context in networks
spatio-temporal databases
computational techniques for human s...
supercomputing for molecular dynamic...
design of cloud workflow systems
location privacy preservation in cog...
network-based analysis of dynamical ...
spatial auditory human-computer inte...
smart tv security
primer on quantum computing
twitter data analytics
demand-driven associative classification
from opinion mining to financial arg...
variational regularization of 3d data
group cell architecture for cooperat...
semantic web-based systems
parallel computing hits the power wall
traceback and anonymity
culture on the edge of chaos
local image descriptor
spatial network data
real-time & stream data management
operators for similarity search
understanding high-dimensional spaces
target detection and tracking by bio...
internet video data streaming
sublinear algorithms for big data ap...
hidden treasures in contemporary rna...
deep neural networks in a mathematic...
sentiment analysis for ptsd signals
research and development in art, des...
mobile data mining
guide to programming for the digital...
redescription mining
linear network error correction coding
software sourcing in the age of open
survey of fractal dimensions of networks
primer on quantum computing
software defined systems
qos prediction in cloud and service ...
understanding modern dive computers ...
contrario line segment detection
software testing in the cloud
brief history of cryptology and cryp...
experience with technology
data mining techniques in sensor net...
time-of-flight cameras
sublinear algorithms for big data ap...
spatio-temporal data streams
resource allocation for software def...
speech-to-speech translation
security for multi-hop wireless networks
voice over ip security
image quality assessment of computer...
attachment transmission in wireless ...
data science careers, training, and ...
multimedia qoe evaluation
physical play and children’s digital...
understanding modern dive computers ...
robust motion detection in real-life...
large group decision making
countering brandjacking in the digit...
non-orthogonal multiple access for m...
sustainable wireless networks
elements of cloud storage security
autonomic cooperative networking
rfid as an infrastructure
mobility data-driven urban traffic m...
web proxy cache replacement strategies
collaborative web hosting
security and privacy in mobile secur...
secure ip mobility management for vanet
data center networks
user-defined tensor data analysis
state of the art in digital media an...
amazing journey of reason
local image descriptor: modern appro...
security assessment in vehicular net...
routing for wireless multi-hop networks
elements of cloud storage security
itil 2011 at a glance
data-driven generation of policies
bootstrapping trust in modern computers
traffic-sign recognition systems
software similarity and classification
research and development in art, des...
fundamental computing forensics for ...
automatic malware analysis
security for wireless implantable me...
fundamental computing forensics for ...
spatial auditory human-computer inte...
generalized jeffrey conditionalization
physical layer security in random ce...
software fault prediction
discriminative pattern discovery on ...
enhanced building information models
energy-efficient high performance co...
crowd-powered mobile computing and s...
amplify-and-forward relaying in wire...
parallel and distributed map merging...
art, design and technology
automated software and service compo...
graph-based clustering and data visu...
wireless virtualization
facial kinship verification
link prediction in social networks
mobile web browsing using the cloud
physical play and children's digital...
guide to ildjit
recurrent neural networks for short-...
mining lurkers in online social networks
spatio-temporal recommendation in so...
interrupt handling schemes in operat...
domain-specific knowledge graph cons...
network hardening
energy-aware scheduling on multiproc...
support vector machines and perceptrons
universal time-series forecasting wi...
glazed panel construction with human...
distributed denial of service attack...
distributed space-time coding
encrypted email
privately and publicly verifiable co...
innovative technologies in everyday life
cooperative networking in a heteroge...
automated configuration problem solving
introduction to image processing using r
location privacy protection in mobil...
elements of cloud computing security
resource management for internet of ...
enhanced building information models
optical flow and trajectory estimati...
software fault detection and correction
survey of fractal dimensions of networks
edge computing: a primer
dynamic cloud collaboration platform
health informatics in the cloud
compilation for secure multi-party c...
modeling and simulating command and ...
spatial autoregression (sar) model
homomorphic signature schemes
digital image processing: practical ...
guide to programming for the digital...
interrupt handling schemes in operat...
two bit circus and the future of ent...
android application security
mining lurkers in online social networks
mac protocols for cyber-physical systems
leakage resilient password systems
image processing and computer vision...
sustainable web ecosystem design
bioinformatics techniques for drug d...
self-* and p2p for network management
data science careers, training, and ...
data mining in large sets of complex...
deep neural networks in a mathematic...
spatial network data
smart tv security
diffusion in social networks
diffusion in social networks
composing fisher kernels from deep n...
spatio-temporal data streams
low resource social media text mining
fitting splines to a parametric function
rapid serial visual presentation
open problems in spectral dimensiona...
trustworthy execution on mobile devices
wireless health
foundations of blockchain
belief revision in non-classical logics
network robustness under large-scale...
general framework for reasoning on i...
fast compact algorithms and software...
tree-based convolutional neural networks
video processing in the cloud
middleware solutions for the interne...
survey on 3d cameras
energy detection for spectrum sensin...
evolutionary game design
data dissemination and query in mobi...
online social media content delivery
large scale hierarchical classification
artificial intelligence tools for cy...
fraud prevention in online digital a...
big data 2.0 processing systems
entropy guided transformation learning
survey of core research in informati...
graph-based clustering and data visu...
context-aware collaborative prediction
resource management in utility and c...
cyber-risk management
on the construction of engineering h...
physical layer security in random ce...
event-driven surveillance
android malware
security-aware cooperation in cognit...
combinatorial testing in cloud computing
lossy image compression
syntactic n-grams in computational l...
4g femtocells
digital image processing
thread and data mapping for multicor...
traceback and anonymity
thread and data mapping for multicor...
unsupervised information extraction ...
image quality assessment of computer...
deep learning in mining of visual co...
automated software and service compo...
operators for similarity search
target detection and tracking by bio...
performance evaluation software
security for cloud storage systems
integrating 3d modeling, photogramme...
cyber security
homomorphic signature schemes
two bit circus and the future of ent...
spatio-temporal recommendation in so...
intermittently connected mobile ad h...
preference query analysis and optimi...
 
 
Change password
Login