[Studies in Computational Intelligence] Computational Intelligence in Digital Forensics: Forensic Investigation and Applications Volume 555 || Signature-Based Biometric Authentication
β Scribed by Muda, Azah Kamilah; Choo, Yun-Huoy; Abraham, Ajith; N. Srihari, Sargur
- Book ID
- 121791016
- Publisher
- Springer International Publishing
- Year
- 2014
- Weight
- 420 KB
- Category
- Article
- ISBN
- 3319058851
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
Dependability Analysis Is The Recent Approach To Performance Evaluation Of Contemporary Systems Which Tries To Cope With New Challenges That Are Brought With Their Unprecedented Complexity, Size And Diversity. Especially In Case Of Computer Systems And Networks Such Evaluation Must Be Based On Multi
Information security and copyright protection are more important today than before. Digital watermarking is one of the widely used techniques used in the world in the area of information security. This book introduces a number of digital watermarking techniques and is divided into four parts. The fi
Intelligent Agents Have Revolutionised The Way We Do Business, We Teach, We Learn, Design Systems, And So On. Agent Applications Are Increasingly Being Developed In - Mains As Diverse As Meteorology, Manufacturing, War Gaming, Uav Mission Mana- Ment And The Evolution Of Web [1]. The Web Has Also Has
The International Conference On Advances In Computing And Information Technology (acity 2012) Provides An Excellent International Forum For Both Academics And Professionals For Sharing Knowledge And Results In Theory, Methodology And Applications Of Computer Science And Information Technology. The S