You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Data Fusion is a very broad interdisciplinary technology domain. It provides techniques and methods for; integrating information from multiple sources and using the complementarities of these detections to derive maximum information about the phenomenon being observed; analyzing and deriving the meaning of these observations and predicting possible consequences of the observed state of the environment; selecting the best course of action; and controlling the actions. Here, the focus is on the more mature phase of data fusion, namely the detection and identification / classification of phenomena being observed and exploitation of the related methods for Security-Related Civil Science and Tech...
The idea of the workshop on Functional Integration, Theory and Applications, held in Louvain-Ia-Neuve from November 6 to 9 1979, was to put in close and informal contact, during a few days, active workers in the field. There is no doubt now that functional integration is a tool that is being applied in all branches of modern physics. Since the earlier works of Dirac and Feynman enormous progress has been made, but unfortunately we lack still a unifying and rigo rous mathematical framework to account for all the situations in which one is interested. We are then in presence of a rapid ly changing field in which new achievements, proposals, and points of view are the normal pattern. Considering this state of affairs we have decided to order the articles starting from the more fundamental and ambitious from the point of view of mathematical rigour, followed by ar ticles in which the main interest is the application to con crete physical situations. It is obvious that this ordering should not be taken too seriously since in many cases there will be an interplay of both objects.
This book constitutes the refereed proceedings of the 5th International Information Security Practice and Experience Conference, ISPEC 2009, held in Xi'an, China in April 2009. The 34 revised full papers were carefully reviewed and selected from 147 submissions. The papers are organized in topical sections on public key encryption, digital signatures, system security, applied cryptography, multimedia security and DRM, security protocols, key exchange and management, hash functions and MACs, cryptanalysis, network security as well as security applications.