SpringerBriefs in computer science,

書目資訊

voice over ip security
demand-driven associative classification
lossy image compression
video processing in the cloud
bootstrapping trust in modern computers
intermittently connected mobile ad h...
evolutionary game design
markov models for handwriting recogn...
traffic-sign recognition systems
guide to ildjit
glazed panel construction with human...
software testing in the cloud
understanding high-dimensional spaces
self-* and p2p for network management
robust motion detection in real-life...
guide to cisco routers configuration
two-dimensional change detection methods
itil 2011 at a glance
group cell architecture for cooperat...
interworking of wireless lans and ce...
automated configuration problem solving
proof theory for description logics
decentralized reasoning in ambient i...
design of cloud workflow systems
service placement in ad hoc networks
primer of multicast routing
event-driven surveillance
software similarity and classification
entropy guided transformation learning
spatial autoregression (sar) model
survey of data leakage detection and...
data dissemination and query in mobi...
autonomic cooperative networking
graph-based clustering and data visu...
security for cloud storage systems
mobile web browsing using the cloud
trustworthy execution on mobile devices
internet resource pricing models
experience with technology
data mining techniques in sensor net...
twitter data analytics
distributed denial of service attack...
integrating 3d modeling, photogramme...
data-driven generation of policies
security-aware cooperation in cognit...
location privacy preservation in cog...
collaborative web hosting
jruby rails web application development
open problems in spectral dimensiona...
human action recognition with depth ...
energy detection for spectrum sensin...
security for multi-hop wireless networks
radio resource management using geom...
variational regularization of 3d data
contrario line segment detection
linear network error correction coding
network hardening
attachment transmission in wireless ...
guide to osi and tcp/ip models
automatic design of decision-tree in...
sublinear algorithms for big data ap...
operators for similarity search
encrypted email
traceback and anonymity
smart tv security
enhanced building information models
spatial auditory human-computer inte...
diffusion in social networks
cyber-risk management
parallel and distributed map merging...
building secure defenses against cod...
two bit circus and the future of ent...
local image descriptor
belief revision in non-classical logics
mobile authentication
real-time detection of lines and grids
energy-efficient high performance co...
network robustness under large-scale...
spatio-temporal networks
dynamic cloud collaboration platform
rfid as an infrastructure
automatic malware analysis
social media audit
energy-aware scheduling on multiproc...
fast compact algorithms and software...
health informatics in the cloud
time-of-flight cameras
querying moving objects detected by ...
web proxy cache replacement strategies
data mining in large sets of complex...
efficient algorithms for discrete wa...
routing for wireless multi-hop networks
omnidirectional vision systems
introduction to image processing using r
modeling and simulating command and ...
performance evaluation software
distributed medium access control in...
general framework for reasoning on i...
cooperative networking in a heteroge...
security for wireless implantable me...
survey of core research in informati...
explaining algorithms using metaphors
rapid serial visual presentation
semantic web-based intelligent geosp...
distributed space-time coding
modeling trust context in networks
graph-based clustering and data visu...
annual dynamics of daylight variabil...
transportation and information
android malware
sustainable web ecosystem design
concepts, ontologies, and knowledge ...
studies on urban vehicular ad-hoc ne...
wireless virtualization
secure ip mobility management for vanet
middleware solutions for the interne...
brief history of cryptology and cryp...
data center networks
sentiment analysis for ptsd signals
security and privacy in mobile secur...
cognitive virtual network operator games
resource management in utility and c...
distributed hash table
location privacy protection in mobil...
4g femtocells
security assessment in vehicular net...
concise computer mathematics
cyber security
spatio-temporal databases
sustainable wireless networks
unsupervised information extraction ...
bluetooth security attacks
countering brandjacking in the digit...
link prediction in social networks
homomorphic signature schemes
spatio-temporal recommendation in so...
automated software and service compo...
spatial network data
research and development in art, des...
elements of cloud computing security
spatio-temporal data streams
big data 2.0 processing systems
support vector machines and perceptrons
cross-cultural multimedia computing
optical flow and trajectory estimati...
innovative technologies in everyday life
target detection and tracking by bio...
elements of cloud storage security
physical layer security in random ce...
physical play and children's digital...
cloud based 5g wireless networks
android application security
wireless health
privately and publicly verifiable co...
resource management for internet of ...
art, design and technology
facial kinship verification
combinatorial testing in cloud computing
internet video data streaming
fraud prevention in online digital a...
systems for big graph analytics
visual pattern discovery and recognition
failure-modes-based software reading
compilation for secure multi-party c...
generalized jeffrey conditionalization
recurrent neural networks for short-...
preference query analysis and optimi...
redescription mining
context-aware collaborative prediction
mobile information retrieval
state of the art in digital media an...
qos prediction in cloud and service ...
discriminative pattern discovery on ...
ontology-based data access leveragin...
guide to digital forensics
deep neural networks in a mathematic...
smartphone-based indoor map construction
image quality assessment of computer...
bioinformatics techniques for drug d...
culture on the edge of chaos
survey of fractal dimensions of networks
software fault prediction
survey on 3d cameras
fundamental computing forensics for ...
auction based resource provisioning ...
data and energy integrated communica...
online social media content delivery
thread and data mapping for multicor...
semantic web-based systems
interrupt handling schemes in operat...
guide to programming for the digital...
composing fisher kernels from deep n...
digital image processing
understanding modern dive computers ...
tree-based convolutional neural networks
large scale hierarchical classification
large group decision making
edge computing
mobile data mining
software fault detection and correction
mining lurkers in online social networks
computational techniques for human s...
primer on quantum computing
data science careers, training, and ...
information security of highly criti...
crowd-powered mobile computing and s...
encrypted email
cloud portability and interoperability
supercomputing for molecular dynamic...
mac protocols for cyber-physical systems
software sourcing in the age of open
local image descriptor: modern appro...
diffusion in social networks
building secure defenses against cod...
cyber-risk management
amplify-and-forward relaying in wire...
sublinear algorithms for big data ap...
automatic design of decision-tree in...
spatial auditory human-computer inte...
quality-aware scheduling for key-val...
two bit circus and the future of ent...
delay tolerant networks
traceback and anonymity
leakage resilient password systems
enhanced building information models
parallel scientific computing
operators for similarity search
smart tv security
parallel and distributed map merging...
spatio-temporal data streams
optical flow and trajectory estimati...
elements of cloud storage security
target detection and tracking by bio...
wireless health
support vector machines and perceptrons
cross-cultural multimedia computing
innovative technologies in everyday life
physical play and children’s digital...
cloud based 5g wireless networks
link prediction in social networks
big data 2.0 processing systems
research and development in art, des...
physical layer security in random ce...
android application security
homomorphic signature schemes
elements of cloud computing security
automated software and service compo...
spatial network data
spatio-temporal recommendation in so...
digital image processing: practical ...
large scale hierarchical classificat...
online social media content delivery
mining lurkers in online social networks
large group decision making
mobile data mining
guide to programming for the digital...
understanding modern dive computers ...
thread and data mapping for multicor...
composing fisher kernels from deep n...
auction based resource provisioning ...
data and energy integrated communica...
survey of fractal dimensions of networks
tree-based convolutional neural networks
edge computing: a primer
interrupt handling schemes in operat...
bioinformatics techniques for drug d...
smartphone-based indoor map construction
culture on the edge of chaos
software fault prediction
image quality assessment of computer...
fundamental computing forensics for ...
artificial intelligence tools for cy...
deep neural networks in a mathematic...
research and development in digital ...
semantic web-based systems
data science careers, training, and ...
real-time & stream data management
computational techniques for human s...
multimedia qoe evaluation
primer on quantum computing
deep learning: convergence to big da...
syntactic n-grams in computational l...
fitting splines to a parametric function
hidden treasures in contemporary rna...
parallel computing hits the power wall
domain-specific knowledge graph cons...
network-based analysis of dynamical ...
software defined systems
amazing journey of reason
heterogeneous facial analysis and sy...
non-orthogonal multiple access for m...
speech-to-speech translation
on the construction of engineering h...
image processing and computer vision...
deep learning in mining of visual co...
universal time-series forecasting wi...
cryptographic obfuscation
construction of fundamental data str...
resource allocation for software def...
foundations of blockchain
identification of pathogenic social ...
user-defined tensor data analysis
mobility data-driven urban traffic m...
from opinion mining to financial arg...
low resource social media text mining
machine learning modeling for iout n...
 
 
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入