Language:
English
繁體中文
Help
Login
SpringerBriefs in computer science,
Titles
voice over ip security
voice over ip security
demand-driven associative classification
demand-driven associative classification
lossy image compression
lossy image compression
video processing in the cloud
video processing in the cloud
bootstrapping trust in modern computers
bootstrapping trust in modern computers
interactive co-segmentation of objec...
interactive co-segmentation of objects in image collections
repairing and querying databases und...
repairing and querying databases under aggregate constraints
intermittently connected mobile ad h...
intermittently connected mobile ad hoc networks
markov decision processes and the be...
markov decision processes and the belief-desire-intention model
evolutionary game design
evolutionary game design
markov models for handwriting recogn...
markov models for handwriting recognition
traffic-sign recognition systems
traffic-sign recognition systems
guide to ildjit
guide to ildjit
glazed panel construction with human...
glazed panel construction with human-robot cooperation
software testing in the cloud
software testing in the cloud
understanding high-dimensional spaces
understanding high-dimensional spaces
self-* and p2p for network management
self-* and p2p for network management
robust motion detection in real-life...
robust motion detection in real-life scenarios
guide to cisco routers configuration
guide to cisco routers configuration
two-dimensional change detection methods
two-dimensional change detection methods
scalable parallel programming applie...
scalable parallel programming applied to h.264/avc decoding
itil 2011 at a glance
itil 2011 at a glance
group cell architecture for cooperat...
group cell architecture for cooperative communications
interworking of wireless lans and ce...
interworking of wireless lans and cellular networks
automated configuration problem solving
automated configuration problem solving
on the mathematics of modelling, met...
on the mathematics of modelling, metamodelling, ontologies and modelling languages
proof theory for description logics
proof theory for description logics
context management for distributed a...
context management for distributed and dynamic context-aware computing
decentralized reasoning in ambient i...
decentralized reasoning in ambient intelligence
design of cloud workflow systems
design of cloud workflow systems
service placement in ad hoc networks
service placement in ad hoc networks
primer of multicast routing
primer of multicast routing
power distribution and performance a...
power distribution and performance analysis for wireless communication networks
event-driven surveillance
event-driven surveillance
software similarity and classification
software similarity and classification
entropy guided transformation learning
entropy guided transformation learning
spatial autoregression (sar) model
spatial autoregression (sar) model
survey of data leakage detection and...
survey of data leakage detection and prevention solutions
data dissemination and query in mobi...
data dissemination and query in mobile social networks
autonomic cooperative networking
autonomic cooperative networking
rhodes framework for android platfor...
rhodes framework for android platform and blackberry smartphones
applications of algebra to communica...
applications of algebra to communications, control, and signal processing
vision-based pedestrian protection s...
vision-based pedestrian protection systems for intelligent vehicles /
graph-based clustering and data visu...
graph-based clustering and data visualization algorithms /
security for cloud storage systems
security for cloud storage systems
mobile web browsing using the cloud
mobile web browsing using the cloud
resource management for device-to-de...
resource management for device-to-device underlay communication
vision-based pedestrian protection s...
vision-based pedestrian protection systems for intelligent vehicles
trustworthy execution on mobile devices
trustworthy execution on mobile devices
internet resource pricing models
internet resource pricing models
experience with technology
experience with technology
data mining techniques in sensor net...
data mining techniques in sensor networks
twitter data analytics
twitter data analytics
distributed denial of service attack...
distributed denial of service attack and defense
integrating 3d modeling, photogramme...
integrating 3d modeling, photogrammetry and design
data-driven generation of policies
data-driven generation of policies
security-aware cooperation in cognit...
security-aware cooperation in cognitive radio networks
seamless and secure communications o...
seamless and secure communications over heterogeneous wireless networks
location privacy preservation in cog...
location privacy preservation in cognitive radio networks
collaborative web hosting
collaborative web hosting
jruby rails web application development
jruby rails web application development
open problems in spectral dimensiona...
open problems in spectral dimensionality reduction
information-theoretic evaluation for...
information-theoretic evaluation for computational biomedical ontologies
human action recognition with depth ...
human action recognition with depth cameras
energy detection for spectrum sensin...
energy detection for spectrum sensing in cognitive radio
security for multi-hop wireless networks
security for multi-hop wireless networks
radio resource management using geom...
radio resource management using geometric water-filling
energy-efficient area coverage for i...
energy-efficient area coverage for intruder detection in sensor networks
variational regularization of 3d data
variational regularization of 3d data
contrario line segment detection
contrario line segment detection
linear network error correction coding
linear network error correction coding
network hardening
network hardening
modeling and analysis of voice and d...
modeling and analysis of voice and data in cognitive radio networks
architectures of small-cell networks...
architectures of small-cell networks and interference management
attachment transmission in wireless ...
attachment transmission in wireless networks
enabling secure and privacy preservi...
enabling secure and privacy preserving communications in smart grids
guide to osi and tcp/ip models
guide to osi and tcp/ip models
protein homology detection through a...
protein homology detection through alignment of markov random fields
automatic design of decision-tree in...
automatic design of decision-tree induction algorithms
sublinear algorithms for big data ap...
sublinear algorithms for big data applications
operators for similarity search
operators for similarity search
encrypted email
encrypted email
traceback and anonymity
traceback and anonymity
smart tv security
smart tv security
enhanced building information models
enhanced building information models
interpretability of computational in...
interpretability of computational intelligence-based regression models
spatial auditory human-computer inte...
spatial auditory human-computer interfaces
diffusion in social networks
diffusion in social networks
modeling and evaluating denial of se...
modeling and evaluating denial of service attacks for wireless and mobile applications
cyber-risk management
cyber-risk management
parallel and distributed map merging...
parallel and distributed map merging and localization
building secure defenses against cod...
building secure defenses against code-reuse attacks
two bit circus and the future of ent...
two bit circus and the future of entertainment
local image descriptor
local image descriptor
belief revision in non-classical logics
belief revision in non-classical logics
mobile authentication
mobile authentication
real-time detection of lines and grids
real-time detection of lines and grids
energy-efficient high performance co...
energy-efficient high performance computing
network robustness under large-scale...
network robustness under large-scale attacks
spatio-temporal networks
spatio-temporal networks
dynamic cloud collaboration platform
dynamic cloud collaboration platform
rfid as an infrastructure
rfid as an infrastructure
automatic malware analysis
automatic malware analysis
guide to modeling and simulation of ...
guide to modeling and simulation of systems of systems of systems
social media audit
social media audit
energy-aware scheduling on multiproc...
energy-aware scheduling on multiprocessor platforms
fast compact algorithms and software...
fast compact algorithms and software for spline smoothing
health informatics in the cloud
health informatics in the cloud
time-of-flight cameras
time-of-flight cameras
querying moving objects detected by ...
querying moving objects detected by sensor networks
motion history images for action rec...
motion history images for action recognition and understanding
web proxy cache replacement strategies
web proxy cache replacement strategies
data mining in large sets of complex...
data mining in large sets of complex data
efficient algorithms for discrete wa...
efficient algorithms for discrete wavelet transform
routing for wireless multi-hop networks
routing for wireless multi-hop networks
omnidirectional vision systems
omnidirectional vision systems
introduction to image processing using r
introduction to image processing using r
physical layer approaches for securi...
physical layer approaches for securing wireless communication systems
modeling and simulating command and ...
modeling and simulating command and control
from fault classification to fault t...
from fault classification to fault tolerance for multi-agent systems
performance evaluation software
performance evaluation software
distributed medium access control in...
distributed medium access control in wireless networks
general framework for reasoning on i...
general framework for reasoning on inconsistency
cooperative networking in a heteroge...
cooperative networking in a heterogeneous wireless medium
security for wireless implantable me...
security for wireless implantable medical devices
survey of core research in informati...
survey of core research in information systems
explaining algorithms using metaphors
explaining algorithms using metaphors
rapid serial visual presentation
rapid serial visual presentation
semantic web-based intelligent geosp...
semantic web-based intelligent geospatial web services
distributed space-time coding
distributed space-time coding
modeling trust context in networks
modeling trust context in networks
graph-based clustering and data visu...
graph-based clustering and data visualization algorithms
annual dynamics of daylight variabil...
annual dynamics of daylight variability and contrast
transportation and information
transportation and information
android malware
android malware
sustainable web ecosystem design
sustainable web ecosystem design
concepts, ontologies, and knowledge ...
concepts, ontologies, and knowledge representation
studies on urban vehicular ad-hoc ne...
studies on urban vehicular ad-hoc networks
wireless virtualization
wireless virtualization
secure ip mobility management for vanet
secure ip mobility management for vanet
middleware solutions for the interne...
middleware solutions for the internet of things
intrusion detection for ip-based mul...
intrusion detection for ip-based multimedia communications over wireless networks
brief history of cryptology and cryp...
brief history of cryptology and cryptographic algorithms
data center networks
data center networks
sentiment analysis for ptsd signals
sentiment analysis for ptsd signals
security and privacy in mobile secur...
security and privacy in mobile security networks
cognitive virtual network operator games
cognitive virtual network operator games
resource management in utility and c...
resource management in utility and cloud computing
distributed hash table
distributed hash table
location privacy protection in mobil...
location privacy protection in mobile networks
4g femtocells
4g femtocells
security assessment in vehicular net...
security assessment in vehicular networks
concise computer mathematics
concise computer mathematics
cyber security
cyber security
spatio-temporal databases
spatio-temporal databases
sustainable wireless networks
sustainable wireless networks
unsupervised information extraction ...
unsupervised information extraction by text segmentation
bluetooth security attacks
bluetooth security attacks
countering brandjacking in the digit...
countering brandjacking in the digital age
distributed computing and monitoring...
distributed computing and monitoring technologies for older patients
link prediction in social networks
link prediction in social networks
homomorphic signature schemes
homomorphic signature schemes
digital watermarking techniques in c...
digital watermarking techniques in curvelet and ridgelet domain
spatio-temporal recommendation in so...
spatio-temporal recommendation in social media
innovative web applications for anal...
innovative web applications for analyzing traffic operations
automated software and service compo...
automated software and service composition
spatial network data
spatial network data
research and development in art, des...
research and development in art, design and creativity
elements of cloud computing security
elements of cloud computing security
spatio-temporal data streams
spatio-temporal data streams
big data 2.0 processing systems
big data 2.0 processing systems
exploring the use of eye gaze contro...
exploring the use of eye gaze controlled interfaces in automotive environments
support vector machines and perceptrons
support vector machines and perceptrons
cross-cultural multimedia computing
cross-cultural multimedia computing
ontology-based procedural modelling ...
ontology-based procedural modelling of traversable buildings composed by arbitrary shapes
optical flow and trajectory estimati...
optical flow and trajectory estimation methods
innovative technologies in everyday life
innovative technologies in everyday life
target detection and tracking by bio...
target detection and tracking by bionanosensor networks
elements of cloud storage security
elements of cloud storage security
physical layer security in random ce...
physical layer security in random cellular networks
physical play and children's digital...
physical play and children's digital games
cloud based 5g wireless networks
cloud based 5g wireless networks
android application security
android application security
wireless health
wireless health
matrix and tensor factorization tech...
matrix and tensor factorization techniques for recommender systems
privately and publicly verifiable co...
privately and publicly verifiable computing techniques
computational methods for processing...
computational methods for processing and analysis of biological pathways
research and development in the acad...
research and development in the academy, creative industries and applications
resource management for internet of ...
resource management for internet of things
efficient biometric indexing and ret...
efficient biometric indexing and retrieval techniques for large-scale systems
art, design and technology
art, design and technology
facial kinship verification
facial kinship verification
secure and trustworthy transportatio...
secure and trustworthy transportation cyber-physical systems
combinatorial testing in cloud computing
combinatorial testing in cloud computing
internet video data streaming
internet video data streaming
fraud prevention in online digital a...
fraud prevention in online digital advertising
systems for big graph analytics
systems for big graph analytics
visual pattern discovery and recognition
visual pattern discovery and recognition
failure-modes-based software reading
failure-modes-based software reading
compilation for secure multi-party c...
compilation for secure multi-party computation
generalized jeffrey conditionalization
generalized jeffrey conditionalization
recurrent neural networks for short-...
recurrent neural networks for short-term load forecasting
preference query analysis and optimi...
preference query analysis and optimization
redescription mining
redescription mining
context-aware collaborative prediction
context-aware collaborative prediction
introduction to distance geometry ap...
introduction to distance geometry applied to molecular geometry
mobile information retrieval
mobile information retrieval
state of the art in digital media an...
state of the art in digital media and applications
qos prediction in cloud and service ...
qos prediction in cloud and service computing
discriminative pattern discovery on ...
discriminative pattern discovery on biological networks
ontology-based data access leveragin...
ontology-based data access leveraging subjective reports
guide to digital forensics
guide to digital forensics
deep neural networks in a mathematic...
deep neural networks in a mathematical framework
smartphone-based indoor map construction
smartphone-based indoor map construction
image quality assessment of computer...
image quality assessment of computer-generated images
bioinformatics techniques for drug d...
bioinformatics techniques for drug discovery
culture on the edge of chaos
culture on the edge of chaos
survey of fractal dimensions of networks
survey of fractal dimensions of networks
software fault prediction
software fault prediction
survey on 3d cameras
survey on 3d cameras
fundamental computing forensics for ...
fundamental computing forensics for africa
auction based resource provisioning ...
auction based resource provisioning in cloud computing
data and energy integrated communica...
data and energy integrated communication networks
online social media content delivery
online social media content delivery
thread and data mapping for multicor...
thread and data mapping for multicore systems
semantic web-based systems
semantic web-based systems
point-of-interest recommendation in ...
point-of-interest recommendation in location-based social networks
interrupt handling schemes in operat...
interrupt handling schemes in operating systems
guide to programming for the digital...
guide to programming for the digital humanities
composing fisher kernels from deep n...
composing fisher kernels from deep neural models
digital image processing
digital image processing
transforming the it services lifecyc...
transforming the it services lifecycle with ai technologies
understanding modern dive computers ...
understanding modern dive computers and operation
tree-based convolutional neural networks
tree-based convolutional neural networks
large scale hierarchical classification
large scale hierarchical classification
large group decision making
large group decision making
edge computing
edge computing
mobile data mining
mobile data mining
spatiotemporal frequent pattern mini...
spatiotemporal frequent pattern mining from evolving region trajectories
software fault detection and correction
software fault detection and correction
mining lurkers in online social networks
mining lurkers in online social networks
computational techniques for human s...
computational techniques for human smile analysis
primer on quantum computing
primer on quantum computing
data science careers, training, and ...
data science careers, training, and hiring
information security of highly criti...
information security of highly critical wireless networks
crowd-powered mobile computing and s...
crowd-powered mobile computing and smart things
encrypted email
encrypted email
cloud portability and interoperability
cloud portability and interoperability
supercomputing for molecular dynamic...
supercomputing for molecular dynamics simulations
modeling and evaluating denial of se...
modeling and evaluating denial of service attacks for wireless and mobile applications
mac protocols for cyber-physical systems
mac protocols for cyber-physical systems
software sourcing in the age of open
software sourcing in the age of open
local image descriptor: modern appro...
local image descriptor: modern approaches
protein homology detection through a...
protein homology detection through alignment of markov random fields
diffusion in social networks
diffusion in social networks
building secure defenses against cod...
building secure defenses against code-reuse attacks
real time deforestation detection us...
real time deforestation detection using ann and satellite images
cyber-risk management
cyber-risk management
amplify-and-forward relaying in wire...
amplify-and-forward relaying in wireless communications
sublinear algorithms for big data ap...
sublinear algorithms for big data applications
automatic design of decision-tree in...
automatic design of decision-tree induction algorithms
spatial auditory human-computer inte...
spatial auditory human-computer interfaces
interpretability of computational in...
interpretability of computational intelligence-based regression models
survey of characteristic engine feat...
survey of characteristic engine features for technology-sustained pervasive games
quality-aware scheduling for key-val...
quality-aware scheduling for key-value data stores
two bit circus and the future of ent...
two bit circus and the future of entertainment
delay tolerant networks
delay tolerant networks
traceback and anonymity
traceback and anonymity
leakage resilient password systems
leakage resilient password systems
enhanced building information models
enhanced building information models
parallel scientific computing
parallel scientific computing
operators for similarity search
operators for similarity search
smart tv security
smart tv security
parallel and distributed map merging...
parallel and distributed map merging and localization
spatio-temporal data streams
spatio-temporal data streams
exploring the use of eye gaze contro...
exploring the use of eye gaze controlled interfaces in automotive environments
optical flow and trajectory estimati...
optical flow and trajectory estimation methods
elements of cloud storage security
elements of cloud storage security
distributed computing and monitoring...
distributed computing and monitoring technologies for older patients
target detection and tracking by bio...
target detection and tracking by bionanosensor networks
wireless health
wireless health
support vector machines and perceptrons
support vector machines and perceptrons
cross-cultural multimedia computing
cross-cultural multimedia computing
digital watermarking techniques in c...
digital watermarking techniques in curvelet and ridgelet domain
innovative technologies in everyday life
innovative technologies in everyday life
physical play and children’s digital...
physical play and children’s digital games
cloud based 5g wireless networks
cloud based 5g wireless networks
link prediction in social networks
link prediction in social networks
big data 2.0 processing systems
big data 2.0 processing systems
research and development in art, des...
research and development in art, design and creativity
physical layer security in random ce...
physical layer security in random cellular networks
innovative web applications for anal...
innovative web applications for analyzing traffic operations
matrix and tensor factorization tech...
matrix and tensor factorization techniques for recommender systems
android application security
android application security
homomorphic signature schemes
homomorphic signature schemes
elements of cloud computing security
elements of cloud computing security
automated software and service compo...
automated software and service composition
spatial network data
spatial network data
spatio-temporal recommendation in so...
spatio-temporal recommendation in social media
ontology-based procedural modelling ...
ontology-based procedural modelling of traversable buildings composed by arbitrary shapes
digital image processing: practical ...
digital image processing: practical approach
spatiotemporal frequent pattern mini...
spatiotemporal frequent pattern mining from evolving region trajectories
large scale hierarchical classificat...
large scale hierarchical classification: state of the art
software fault detection and correct...
software fault detection and correction: modeling and applications
online social media content delivery
online social media content delivery
mining lurkers in online social networks
mining lurkers in online social networks
large group decision making
large group decision making
mobile data mining
mobile data mining
guide to programming for the digital...
guide to programming for the digital humanities
understanding modern dive computers ...
understanding modern dive computers and operation
thread and data mapping for multicor...
thread and data mapping for multicore systems
composing fisher kernels from deep n...
composing fisher kernels from deep neural models
auction based resource provisioning ...
auction based resource provisioning in cloud computing
data and energy integrated communica...
data and energy integrated communication networks
survey of fractal dimensions of networks
survey of fractal dimensions of networks
tree-based convolutional neural networks
tree-based convolutional neural networks
edge computing: a primer
edge computing: a primer
transforming the it services lifecyc...
transforming the it services lifecycle with ai technologies
interrupt handling schemes in operat...
interrupt handling schemes in operating systems
bioinformatics techniques for drug d...
bioinformatics techniques for drug discovery
smartphone-based indoor map construction
smartphone-based indoor map construction
culture on the edge of chaos
culture on the edge of chaos
software fault prediction
software fault prediction
image quality assessment of computer...
image quality assessment of computer-generated images
survey on 3d cameras: metrological c...
survey on 3d cameras: metrological comparison of time-of-flight, structured-light and active stereoscopy technologies
fundamental computing forensics for ...
fundamental computing forensics for africa
artificial intelligence tools for cy...
artificial intelligence tools for cyber attribution
deep neural networks in a mathematic...
deep neural networks in a mathematical framework
research and development in digital ...
research and development in digital media
semantic web-based systems
semantic web-based systems
point-of-interest recommendation in ...
point-of-interest recommendation in location-based social networks
data science careers, training, and ...
data science careers, training, and hiring
practical security properties on com...
practical security properties on commodity computing platforms
real-time & stream data management
real-time & stream data management
visual and text sentiment analysis t...
visual and text sentiment analysis through hierarchical deep learning networks
computational techniques for human s...
computational techniques for human smile analysis
multimedia qoe evaluation
multimedia qoe evaluation
primer on quantum computing
primer on quantum computing
deep learning: convergence to big da...
deep learning: convergence to big data analytics
syntactic n-grams in computational l...
syntactic n-grams in computational linguistics
fitting splines to a parametric function
fitting splines to a parametric function
hidden treasures in contemporary rna...
hidden treasures in contemporary rna sequencing
fault prediction modeling for the pr...
fault prediction modeling for the prediction of number of software faults
parallel computing hits the power wall
parallel computing hits the power wall
domain-specific knowledge graph cons...
domain-specific knowledge graph construction
asymptotic nonparametric statistical...
asymptotic nonparametric statistical analysis of stationary time series
segmentation and separation of overl...
segmentation and separation of overlapped latent fingerprints
network-based analysis of dynamical ...
network-based analysis of dynamical systems
software defined systems
software defined systems
amazing journey of reason
amazing journey of reason
heterogeneous facial analysis and sy...
heterogeneous facial analysis and synthesis
non-orthogonal multiple access for m...
non-orthogonal multiple access for massive connectivity
speech-to-speech translation
speech-to-speech translation
mission-critical application driven ...
mission-critical application driven intelligent maritime networks
on the construction of engineering h...
on the construction of engineering handbooks
image processing and computer vision...
image processing and computer vision in ios
deep learning in mining of visual co...
deep learning in mining of visual content
universal time-series forecasting wi...
universal time-series forecasting with mixture predictors
cryptographic obfuscation
cryptographic obfuscation
construction of fundamental data str...
construction of fundamental data structures for strings
turbo message passing algorithms for...
turbo message passing algorithms for structured signal recovery
resource allocation for software def...
resource allocation for software defined networks
foundations of blockchain
foundations of blockchain
identification of pathogenic social ...
identification of pathogenic social media accounts
user-defined tensor data analysis
user-defined tensor data analysis
mobility data-driven urban traffic m...
mobility data-driven urban traffic monitoring
from opinion mining to financial arg...
from opinion mining to financial argument mining
low resource social media text mining
low resource social media text mining
machine learning modeling for iout n...
machine learning modeling for iout networks
quantum algorithms for cryptographic...
quantum algorithms for cryptographically significant boolean functions
iot supply chain security risk analysis and mitigation
machine learning for cybersecurity
bringing machine learning to software-defined networks
feedback arc set
cyber-security threats and response models in nuclear power plants
robust network compressive sensing
latent factor analysis for high-dimensional and sparse matrices
deep learning in solar astronomy
knowledge discovery from multi-sourced data
secure multi-party e-commerce protocols
devops for airborne software
main memory management on relational database systems
greenedge: new perspectives to energy management and supply in mobile edge computing
data, information, and time
mobile edge caching in heterogeneous vehicular networks
guide to differential privacy modifications
deep learning to see
privacy preservation in iot: machine learning approaches
cohesive subgraph search over large heterogeneous information networks
primer on generative adversarial networks
generative methods for social media analysis
chronicles
document layout analysis
research on modeling and using context over 25 years
intent recognition for human-machine interactions
neuro symbolic reasoning and learning
robot control and calibration
wifi signal-based user authentication
Processing
...
Change password
Login