Advances in Intelligent Systems and Applications - Volume 2

Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12–14, 2012

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read


Download Options

Buy this book

Last edited by ImportBot
February 26, 2022 | History

Advances in Intelligent Systems and Applications - Volume 2

Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12–14, 2012

  • 0 Ratings
  • 0 Want to read
  • 0 Currently reading
  • 0 Have read

The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Systems and Applications. It consists of research papers in the following specific topics:

l Authentication, Identification, and Signature

l Intrusion Detection

l Steganography, Data Hiding, and Watermarking

l Database, System, and Communication Security

l Computer Vision, Object Tracking, and Pattern Recognition

l Image Processing, Medical Image Processing, and Video Coding

l Digital Content, Digital Life, and Human Computer Interaction

l Parallel, Peer-to-peer, Distributed, and Cloud Computing

l Software Engineering and Programming Language

This book provides a reference to theoretical problems as well as practical solutions and applications for the state-of-the-art results in Intelligent Systems and Applications on the aforementioned topics. In particular, both the academic community (graduate students, post-doctors and faculties) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staffs and managers, security managers) will find this book interesting.

Publish Date
Language
English
Pages
811

Buy this book

Previews available in: English

Book Details


Table of Contents

Authentication, Identi cation, and Signature
Intrusion Detection
Steganography, Data Hiding, and Watermarking
Database, System, and Communication Security
Computer Vision, Object Tracking, and Pattern Recognition
Image Processing, Medical Image Processing, and Video Coding
Digital Content, Digital Life, and Human Computer Interaction
Parallel, Peer-to-Peer, Distributed, and Cloud Computing
Software Engineering and Programming Language
Computer Architecture, Embedded Systems, SoC, and VLSI/EDA.

Edition Notes

Published in
Berlin, Heidelberg
Series
Smart Innovation, Systems and Technologies -- 21

Classifications

Dewey Decimal Class
006.3
Library of Congress
Q342

The Physical Object

Format
[electronic resource] :
Pagination
XXIV, 811 p. 505 illus.
Number of pages
811

ID Numbers

Open Library
OL27015075M
Internet Archive
advancesintellig2012liao
ISBN 13
9783642354731

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
February 26, 2022 Edited by ImportBot import existing book
June 28, 2019 Created by MARC Bot Imported from Internet Archive item record.