<p><P>This book constitutes the refereed proceedings of the First International Multi Topic Conference, IMTIC 2008, held in Jamshoro, Pakistan, in April 2008.</P><P>The 46 revised full papers presented were carefully reviewed and selected from a total of 135 submissions. The topics include but are n
Communication Technologies, Information Security and Sustainable Development: Third International Multi-topic Conference, IMTIC 2013, Jamshoro, Pakistan, December 18--20, 2013, Revised Selected Papers
โ Scribed by Faisal Karim Shaikh, Bhawani Shankar Chowdhry, Sherali Zeadally, Dil Muhammad Akbar Hussain, Aftab Ahmed Memon, Muhammad Aslam Uqaili (eds.)
- Publisher
- Springer
- Year
- 2014
- Tongue
- English
- Leaves
- 302
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Subjects
Computer Imaging, Vision, Pattern Recognition and Graphics
๐ SIMILAR VOLUMES
<p>This book constitutes the refereed proceedings of the Second International Multi-topic Conference, IMTIC 2012, held in Jamshoro, Pakistan, in March 2012. The 51 revised full papers presented were carefully reviewed and selected from 205 submissions. The papers address topics from information comm
This book constitutes the refereed proceedings of the First International Multi Topic Conference, IMTIC 2008, held in Jamshoro, Pakistan, in April 2008. The 46 revised full papers presented were carefully reviewed and selected from a total of 135 submissions. The topics include but are not limited
<p><p>This book constitutes the refereed proceedings of the Third International Conference on Information, Communication and Computing Technology, ICICCT 2018, held in New Delhi, India, in May 2018.</p>The 18 revised full papers presented in this volume were carefully reviewed and selected from 295
<p><p>This book constitutes the revised selected papers from the 13 European Conference on Multi-Agent Systems, EUMAS 2015, and the Third International Conference on Agreement Technologies, AT 2015, held in Athens, Greece, in December 2015.<br>The 36 papers presented in this volume were carefully re
<p><div>This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015.