Welcome to Central Library, SUST
Amazon cover image
Image from Amazon.com
Image from Google Jackets

Advances in Intelligent Systems and Applications - Volume 2 [electronic resource] : Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12–14, 2012 / edited by Jeng-Shyang Pan, Ching-Nung Yang, Chia-Chen Lin.

Contributor(s): Material type: TextTextSeries: Smart Innovation, Systems and Technologies ; 21Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013Description: XXIV, 811 p. 505 illus. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642354731
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 006.3 23
LOC classification:
  • Q342
Online resources:
Contents:
Authentication, Identi cation, and Signature -- Intrusion Detection -- Steganography, Data Hiding, and Watermarking -- Database, System, and Communication Security -- Computer Vision, Object Tracking, and Pattern Recognition -- Image Processing, Medical Image Processing, and Video Coding -- Digital Content, Digital Life, and Human Computer Interaction -- Parallel, Peer-to-Peer, Distributed, and Cloud Computing -- Software Engineering and Programming Language -- Computer Architecture, Embedded Systems, SoC, and VLSI/EDA.
In: Springer eBooksSummary: The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Systems and Applications. It consists of research papers in the following specific topics:  l   Authentication, Identification, and Signature l   Intrusion Detection l   Steganography, Data Hiding, and Watermarking l   Database, System, and Communication Security l   Computer Vision, Object Tracking, and Pattern Recognition l   Image Processing, Medical Image Processing, and Video Coding l   Digital Content, Digital Life, and Human Computer Interaction l   Parallel, Peer-to-peer, Distributed, and Cloud Computing l   Software Engineering and Programming Language  This book provides a reference to theoretical problems as well as practical solutions and applications for the state-of-the-art results in Intelligent Systems and Applications on the aforementioned topics. In particular, both the academic community (graduate students, post-doctors and faculties) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staffs and managers, security managers) will find  this book interesting.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Authentication, Identi cation, and Signature -- Intrusion Detection -- Steganography, Data Hiding, and Watermarking -- Database, System, and Communication Security -- Computer Vision, Object Tracking, and Pattern Recognition -- Image Processing, Medical Image Processing, and Video Coding -- Digital Content, Digital Life, and Human Computer Interaction -- Parallel, Peer-to-Peer, Distributed, and Cloud Computing -- Software Engineering and Programming Language -- Computer Architecture, Embedded Systems, SoC, and VLSI/EDA.

The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Systems and Applications. It consists of research papers in the following specific topics:  l   Authentication, Identification, and Signature l   Intrusion Detection l   Steganography, Data Hiding, and Watermarking l   Database, System, and Communication Security l   Computer Vision, Object Tracking, and Pattern Recognition l   Image Processing, Medical Image Processing, and Video Coding l   Digital Content, Digital Life, and Human Computer Interaction l   Parallel, Peer-to-peer, Distributed, and Cloud Computing l   Software Engineering and Programming Language  This book provides a reference to theoretical problems as well as practical solutions and applications for the state-of-the-art results in Intelligent Systems and Applications on the aforementioned topics. In particular, both the academic community (graduate students, post-doctors and faculties) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staffs and managers, security managers) will find  this book interesting.

There are no comments on this title.

to post a comment.