1
Table of Contents: ... and Contours -- Corner Detection -- Detecting Simple Curves -- Morphological Filters -- Regions in Binary...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ... in the Future of Intelligent Information Processing -- Knowledge Mining Biological Network Models...
View full text
Electronic eBook
3
Published 2005
Table of Contents: ... Sets Approach to Analysis of CUDT -- Intrusion Detection Based on Organizational Coevolutionary Fuzzy...
View full text
Electronic eBook
4
Published 2014
Table of Contents: ...Speech Language Processing and Applications -- Automatically Recognising European Portuguese...
View full text
Electronic eBook
5
Table of Contents: ...Introduction -- Automatic Thresholding -- Filters for Color Images -- Edge Detection in Color...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ... of Distributed Java Programs -- A Delay-Based Dynamic Load Balancing Method and Its Stability Analysis...
View full text
Electronic eBook
7
Published 2010
Table of Contents: ...Third Workshop on Highly Parallel Processing on a Chip (HPPC 2009) -- HPPC 2009: 3rd Workshop...
View full text
Electronic eBook
8
Published 2011
Table of Contents: ...: Java-based Associative Memory -- Conversation Peculiarities of People with Different Verbal...
View full text
Electronic eBook
9
Published 2013
Table of Contents: ... -- Intrusion Detection in Zero Knowledge System Using Model Checking Approach -- Detecting Malicious users in P...
View full text
Electronic eBook
10
Published 2005
Table of Contents: ... Computing Using Free Load Profiles -- Active Link: Status Detection Mechanism for Distributed Service Based...
View full text
Electronic eBook
11
Published 2014
Table of Contents: ... and fault detection in the Software System: An Empirical Approach -- Software Coverage and Its Analysis...
View full text
Electronic eBook
12
Published 2013
Table of Contents: ... Encryption -- Proofs of Retrievability via Fountain Code -- MARC: Modified ARC4 -- Detection of HTTP-GET...
View full text
Electronic eBook
13
Published 2005
Table of Contents: ... for Interconnection Constrained Network of Heterogeneous Processors -- Neural Networks -- Detecting Topology...
View full text
Electronic eBook
14
Published 2007
Table of Contents: ... -- On Device-Based Identity Management in Enterprises -- Analysis-Level Classes from Secure Business Processes...
View full text
Electronic eBook
15
Published 2007
Table of Contents: ... -- Personalized E-Learning Process Using Effective Assessment and Feedback -- Optimally Pricing European Options...
View full text
Electronic eBook
16
Published 2013
Table of Contents: ...: A Java Type-2 Fuzzy Inference Systems Class Library for Building Object-Oriented Intelligent...
View full text
Electronic eBook
17
Published 2008
Table of Contents: ... for Detection of Windows PE Virus -- Using Genetic Algorithms for Parameter Optimization in Building Predictive...
View full text
Electronic eBook
18
Published 2006
Table of Contents: ... VRML and JAVA to Build Virtual Game-Based Learning Environment for Addition and Subtraction Operation...
View full text
Electronic eBook
19
Published 2007
Table of Contents: ...Keynote -- Security Issues for the Use of Semantic Web in E-Commerce -- Business Process Management...
View full text
Electronic eBook
20
Published 2008
Table of Contents: ... Symbolic Execution -- Static Detection of Place Locality and Elimination of Runtime Checks -- Certified...
View full text
Electronic eBook