![]() |
Similarity and Compatibility in Fuzzy Set Theory: Assessment and Applications
ISBN: 9783790825077 / Angielski / Miękka / 209 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Assessing the degree to which two objects, an object and a query, or two concepts are similar or compatible is a fundamental component of human reasoning and consequently is critical in the development of automated diagnosis, classification, information retrieval and decision systems. The assessment of similarity has played an important role in such diverse disciplines such as taxonomy, psychology, and the social sciences. Each discipline has proposed methods for quantifying similarity judgments suitable for its particular applications. This book presents a unified approach to quantifying...
Assessing the degree to which two objects, an object and a query, or two concepts are similar or compatible is a fundamental component of human reason...
|
cena:
402,53 |
![]() |
Advanced Fuzzy Systems Design and Applications
ISBN: 9783790825206 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Fuzzy rule systems have found a wide range of applications in many fields of science and technology. Traditionally, fuzzy rules are generated from human expert knowledge or human heuristics for relatively simple systems. In the last few years, data-driven fuzzy rule generation has been very active. Compared to heuristic fuzzy rules, fuzzy rules generated from data are able to extract more profound knowledge for more complex systems. This book presents a number of approaches to the generation of fuzzy rules from data, ranging from the direct fuzzy inference based to neural net- works and...
Fuzzy rule systems have found a wide range of applications in many fields of science and technology. Traditionally, fuzzy rules are generated from hum...
|
cena:
402,53 |
![]() |
State-of-the-Art in Content-Based Image and Video Retrieval
ISBN: 9789048158638 / Angielski / Miękka / 345 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Images and video play a crucial role in visual information systems and multimedia. There is an extraordinary number of applications of such systems in entertainment, business, art, engineering, and science. Such applications often involved large image and video collections, and therefore, searching for images and video in large collections is becoming an important operation. Because of the size of such databases, efficiency is crucial. We strongly believe that image and video retrieval need an integrated approach from fields such as image processing, shape processing, perception, database...
Images and video play a crucial role in visual information systems and multimedia. There is an extraordinary number of applications of such systems in...
|
cena:
402,53 |
![]() |
Personalized Digital Television: Targeting Programs to Individual Viewers
ISBN: 9789048166046 / Angielski / Miękka / 321 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. TV viewers today are exposed to overwhelming amounts of information, and challenged by the plethora of interactive functionality provided by current set-top boxes. To ensure broad adoption of this technology by consumers, future Digital Television will have to take usability issues thoroughly into account. In particular, serious attention must be paid to facilitate the selection of content on an individual basis, and to provide easy-to-use interfaces that satisfy viewers' interaction requirements. This volume collects selected research reports on the development of personalized... TV viewers today are exposed to overwhelming amounts of information, and challenged by the plethora of interactive functionality provided by curren... |
cena:
603,81 |
![]() |
Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings
ISBN: 9783642174544 / Angielski / Miękka / 467 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot Spring, Japan, in December 2010.The 25 full papers presented were carefully reviewed and selected from 64 submissions. The contributions are organized in topical sections on: efficient software implementation; digital signatures; cryptographic protocols; key agreement; applications - code generation, time-released encryption, and cloud computing; point encoding and pairing-friendly curves; ID-based encryption schemes; and efficient hardware,...
This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot S...
|
cena:
201,24 |
![]() |
The Codes of Life: The Rules of Macroevolution
ISBN: 9789048176113 / Angielski / Miękka / 440 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Building on a range of disciplines - from biology and anthropology to philosophy and linguistics - this book draws on the expertise of leading names in the study of organic, mental and cultural codes brought together by the emerging discipline of biosemiotics. The book's 18 chapters present a range of experimental evidence which suggests that the genetic code was only the first in a long series of organic codes, and that it has been the appearance of new codes - organic, mental and cultural - that paved the way for the major transitions in the history of life. While the... Building on a range of disciplines - from biology and anthropology to philosophy and linguistics - this book draws on the expertise of leading name... |
cena:
1006,38 |
![]() |
Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings
ISBN: 9783642176180 / Angielski / Miękka / 355 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12-14, 2010. The conference was co-organized by the Multimedia University (MMU), Malaysia, and Universiti Tunku Abdul Rahman (UTAR), Malaysia. The conference received 64 submissions from 22 countries, out of which 21 were accepted after a careful and thorough review process. These proceedings also contain abstracts for two invited talks. All submissions were reviewed by at least three members of the Program Committee; those authored or co-authored by Program...
The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12-14, 2010. The co...
|
cena:
201,24 |
![]() |
Digital Watermarking: 9th International Workshop, Iwdw 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers
ISBN: 9783642184048 / Angielski / Miękka / 317 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010. The 26 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on forensics, visual cryptography, robust watermarking, steganography, fingerprinting, and steganalysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held i...
|
cena:
201,24 |
![]() |
An Introduction to Mathematical Cryptography
ISBN: 9781441926746 / Angielski / Miękka / 524 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ThecreationofpublickeycryptographybyDi?eandHellmanin1976andthe subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman in 1978 are watershed events in the long history of secret c- munications. It is hard to overestimate the importance of public key cr- tosystems and their associated digital signature schemes in the modern world of computers and the Internet. This book provides an introduction to the theory of public key cryptography and to the mathematical ideas underlying that theory. Public key cryptography draws on many areas of mathematics, including number...
ThecreationofpublickeycryptographybyDi?eandHellmanin1976andthe subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman ...
|
cena:
201,24 |
![]() |
Preferences and Similarities
ISBN: 9783211999417 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The fields of similarity and preference are still broadening due to the exploration of new fields of application. This is caused by the strong impact of vagueness, imprecision, uncertainty and dominance on human and agent information, communication, planning, decision, action, and control as well as by the technical progress of the information technology itself. The topics treated in this book are of interest to computer scientists, statisticians, operations researchers, experts in AI, cognitive psychologists and economists. The fields of similarity and preference are still broadening due to the exploration of new fields of application. This is caused by the strong impa... |
cena:
603,81 |
![]() |
Securing Emerging Wireless Systems: Lower-Layer Approaches
ISBN: 9781441946935 / Angielski / Miękka / 362 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a... Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the... |
cena:
402,53 |
![]() |
Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings
ISBN: 9783642101762 / Angielski / Miękka / 444 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world. SEC 2009 was organized by the Technical Committee 11 (TC-11) of IFIP, and took place in Pafos, Cyprus, during May 18-20, 2009. It is an indication of good fortune for a Chair to serve a conference that takes place in a country with the natural beauty of Cyprus, an island where the hospitality and frie- liness of the people have been going together, hand-in-hand, with its long...
It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a...
|
cena:
402,53 |
![]() |
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security
ISBN: 9783642096884 / Angielski / Miękka / 273 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are doing just that. VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This volume... Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide secur... |
cena:
201,24 |
![]() |
Fractal Image Encoding and Analysis
ISBN: 9783642083242 / Angielski / Miękka / 370 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The related fields of fractal image encoding and fractal image analysis have blossomed in recent years. This book, originating from a NATO Advanced Study Institute held in 1995, presents work by leading researchers. It is developing the subjects at an introductory level, but it also has some recent and exciting results in both fields.
The book contains a thorough discussion of fractal image compression and decompression, including both continuous and discrete formulations, vector space and hierarchical methods, and algorithmic optimizations. The book also discusses multifractal approaches... The related fields of fractal image encoding and fractal image analysis have blossomed in recent years. This book, originating from a NATO Advanced St...
|
cena:
805,10 |
![]() |
Public-Key Cryptography
ISBN: 9783642082542 / Angielski / Miękka / 275 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications in computers and communications. This book gives a broad overview of public-key cryptography - its essence and advantages, various public-key cryptosystems, and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second edition has been revised and enlarged especially in its treatment of cryptographic protocols. From a review of the first edition: "This is a comprehensive review ... there can be...
Cryptography, secret writing, is enjoying a scientific renaissance following the seminal discovery in 1977 of public-key cryptography and applications...
|
cena:
201,24 |
![]() |
Power Analysis Attacks: Revealing the Secrets of Smart Cards
ISBN: 9781441940391 / Angielski / Miękka / 338 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance. Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how... Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mo... |
cena:
724,58 |
![]() |
Database Machines: International Workshop Munich, September 1983
ISBN: 9783540129592 / Angielski / Miękka / 344 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The International Workshop on Database Machines in Munich is the third of its kind, preceeded by the meetings in Florence (Sept. 81) and San Diego (Sept. 82). The workshop is aimed at providing an interchange of ideas and experience on computer systems designed to perform database operations more efficiently than general purpose computers with a software database management system. Many proposals have been published during the past 10 years, but now several systems have been built and practically implemented and some are even commercially available, so that confrontation with the real world...
The International Workshop on Database Machines in Munich is the third of its kind, preceeded by the meetings in Florence (Sept. 81) and San Diego (Se...
|
cena:
402,53 |
![]() |
A Classical Introduction to Cryptography Exercise Book
ISBN: 9781441939128 / Angielski / Miękka / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY...
TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerlan...
|
cena:
173,06 |
![]() |
Advances in Cryptology - Eurocrypt '95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21
ISBN: 9783540594093 / Angielski / Miękka / 417 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. EUROCRYPT '95. Sponsored by the International Association for Cryp- logic Research (IACR), in cooperation with the Centre Commun d'Etudes de T616vision et T61Qcommunications (CCETT), a workshop on the theory and - plications of cryptographic techniques takes place at the Palais du Grand Large, Saint Malo, France, May 21-25, 1995. The General Chair of EUROCRYPT '95 is Franqoise Scarabin. The Or- nization Committee was helped by Maryvonne Lahaie and her communication team. Moreover, the CCETT has generously provided the help of a young - glish lady, Miss Virginia Cooper, for the secretariat of...
EUROCRYPT '95. Sponsored by the International Association for Cryp- logic Research (IACR), in cooperation with the Centre Commun d'Etudes de T616visio...
|
cena:
201,24 |
![]() |
Advances in Cryptology – EUROCRYPT ’96: International Conference on the Theory and Application of Cryptographic Techniques Saragossa, Spain, May 12–16, 1996 Proceedings
ISBN: 9783540611868 / Angielski / Miękka / 416 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The EUROCRYPT '96 conference was sponsored by the International Asso- ation for Cryptologic Research (IACR)l, in cooperation with the University of Saragossa. It took place at the Palacio de Congresos in Saragossa, Spain, during May 12-16, 1996. This was the fifteenth annual EUROCRYPT conference (this name has been used since the third conference held in 1984), each of which has been held in a different city in Europe. For the second time, proceedings were available at the conference. JosC Pastor Franco, the General Chair, was resp- sible for local organization and registration. His...
The EUROCRYPT '96 conference was sponsored by the International Asso- ation for Cryptologic Research (IACR)l, in cooperation with the University of Sa...
|
cena:
201,24 |