You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Higher Education Leadership and Management have become increasingly important throughout the years due to the complexities that have to be addressed by universities worldwide. This can be seen not only in professionalisation in fields such as faculty management or in areas of quality assurance and internationalisation, but also in the need for exchange and training in academic leadership, such as that of deans or study deans, or of university leadership in general. The Dialogue on Innovative Higher Education Strategies (DIES) is addressing this need in emerging countries by building platforms of exchange and offering training courses. Not only is the programme supporting capacity building of...
Digital Image Computing: Techniques and Applications is the premier biennial conference in Australia on the topics of image processing and image analysis. This seventh edition of the proceedings has seen an unprecedented level of submission, on such diverse areas as: Image processing; Face recognition; Segmentation; Registration; Motion analysis; Medical imaging; Object recognition; Virtual environments; Graphics; Stereo-vision; and Video analysis. These two volumes contain all the 108 accepted papers and five invited talks that were presented at the conference. These two volumes provide the Australian and international imaging research community with a snapshot of current theoretical and practical developments in these areas. They are of value to any engineer, computer scientist, mathematician, statistician or student interested in these matters.
Many techniques, algorithms, protocols and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols, while bringing together the understanding of security problems related to the protocols and applications of the Internet, and the contemporary solutions to these problems. Web Services Security and E-Business provides insight into uncovering the security risks of dynamically-created content, and how proper content management can greatly improve the overall security. It also studies the security lifecycle and how to respond to an attack, as well as the problems of site hijacking and phishing.
"This book presents new concepts regarding reliability, availability, manageability, performance, scalability, and secured-ability of applications, particularly those that run over the Web. It examines causes of failure in Web-based information system development projects, and indicates that to exploit the unprecedented opportunities offered by e-service applications, businesses and users alike need a highly available, reliable, and efficient telecommunication infrastructure"--Provided by publisher.
This book constitutes the thoroughly refereed post-conference proceedings of the First International ICST Conference on Wireless Communications and Applications, ICWCA 2011, held in Sanya, China, in August 2011. The 43 revised full papers presented were carefully reviewed and selected from around 90 submissions and cover a wide range of topics as mobile ad hoc networks, sensor networks, network architectural design, network protocol design, local area networks, MAC, routing, and transport protocols, quality of service provisioning, reliability and fault tolerance issues, resource allocation and management, signal processing, medical imaging, data aggregation techniques, security and privacy issues, wireless computing and applications for wireless network as smart grid, agriculture, health care, smart home, conditional monitoring, etc.
In the era globalisation the emerging technologies are governing engineering industries to a multifaceted state. The escalating complexity has demanded researchers to find the possible ways of easing the solution of the problems. This has motivated the researchers to grasp ideas from the nature and implant it in the engineering sciences. This way of thinking led to emergence of many biologically inspired algorithms that have proven to be efficient in handling the computationally complex problems with competence such as Genetic Algorithm (GA), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), etc. Motivated by the capability of the biologically inspired algorithms the present ...
The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.
This book constitutes the refereed proceedings of the Second Pacific Rim Symposium on Image and Video Technology, PSIVT 2007, held in Santiago, Chile, in December 2007. The 75 revised full papers presented together with four keynote lectures were carefully reviewed and selected from 155 submissions. The symposium features ongoing research including all aspects of video and multimedia, both technical and artistic perspectives and both theoretical and practical issues.
This book constitutes the refereed proceedings of the International Conference on Embedded and Ubiquitous Computing, EUC 2006, held in Seoul, Korea, August 2006. The book presents 113 revised full papers together with 3 keynote articles, organized in topical sections on power aware computing, security and fault tolerance, agent and distributed computing, wireless communications, real-time systems, embedded systems, multimedia and data management, mobile computing, network protocols, middleware and P2P, and more.
This book constitutes the refereed proceedings of the First Pacific Rim Symposium on Image and Video Technology, PSIVT 2006, held in Hsinchu, Taiwan in December 2006. The 76 revised full papers and 58 revised poster papers cover a wide range of topics, including all aspects of video and multimedia, both technical and artistic perspectives and both theoretical and practical issues.