You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The First International Conference on Digital Forensics and Cyber Crime (ICDF2C) was held in Albany from September 30 to October 2, 2009. The field of digital for- sics is growing rapidly with implications for several fields including law enforcement, network security, disaster recovery and accounting. This is a multidisciplinary area that requires expertise in several areas including, law, computer science, finance, networking, data mining, and criminal justice. This conference brought together pr- titioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees. All the conference sessions were very well attended with vigorous d...
The Human Machine Interaction in the Digital Era (ICHMIDE) 2023 conference aims to address the main issues of concern in the design issues with a particular emphasis on the design and development of interfaces for autonomous robots. Its main objective is to provide an international forum for the dissemination and exchange of up-to-date scientific information on research related to integrated human/machine systems at multiple scales, and includes areas such as human/machine interaction, engineering mathematical models, assistive technologies, system modelling, design, testing and validation. The organization of ICHMS is based on the following Track types: Smart Applications for Digital Era, Computational Mathematical and Electronics, Intelligent Systems in Security and Communication Technologies, Technological Interventions using AI and Machine Learning, Applied Science, and IoT Techniques for Industries.
PIXELS & PAINTINGS “The discussion is firmly grounded in established art historical practices, such as close visual analysis and an understanding of artists’ working methods, and real-world examples demonstrate how computer-assisted techniques can complement traditional approaches.” —Dr. Emilie Gordenker, Director of the Van Gogh Museum The pioneering presentation of computer-based image analysis of fine art, forging a dialog between art scholars and the computer vision community In recent years, sophisticated computer vision, graphics, and artificial intelligence algorithms have proven to be increasingly powerful tools in the study of fine art. These methods—some adapted from fore...
The eight-volume set comprising LNCS volumes 9905-9912 constitutes the refereed proceedings of the 14th European Conference on Computer Vision, ECCV 2016, held in Amsterdam, The Netherlands, in October 2016. The 415 revised papers presented were carefully reviewed and selected from 1480 submissions. The papers cover all aspects of computer vision and pattern recognition such as 3D computer vision; computational photography, sensing and display; face and gesture; low-level vision and image processing; motion and tracking; optimization methods; physics-based vision, photometry and shape-from-X; recognition: detection, categorization, indexing, matching; segmentation, grouping and shape representation; statistical methods and learning; video: events, activities and surveillance; applications. They are organized in topical sections on detection, recognition and retrieval; scene understanding; optimization; image and video processing; learning; action, activity and tracking; 3D; and 9 poster sessions.
Part of a four-volume set, this book constitutes the refereed proceedings of the 7th International Conference on Computational Science, ICCS 2007, held in Beijing, China in May 2007. The papers cover a large volume of topics in computational science and related areas, from multiscale physics to wireless networks, and from graph theory to tools for program development.
This open access book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, Face Morphing, or Reenactment. It combines the research fields of biometrics and media forensics including contributions from academia and industry. Appealing to a broad readership, introductory chapters provide a comprehensive overview of the topic, which address readers wishing to gain a brief overview of the state-of-the-art. Subsequent chapters, which delve deeper into various research challenges, are oriented towards advanced readers. Moreover, the book provides a good starting point for young researchers as well as a reference guide pointing at further literature. Hence, the primary readership is academic institutions and industry currently involved in digital face manipulation and detection. The book could easily be used as a recommended text for courses in image processing, machine learning, media forensics, biometrics, and the general security area.
This book presents refereed proceedings of the Third International Conference on Advances in Cyber Security, ACeS 2021, held in Penang, Malaysia, in August 2021. The 36 full papers were carefully reviewed and selected from 92 submissions. The papers are organized in the following topical sections: Internet of Things, Industry 4.0 and Blockchain, and Cryptology; Digital Forensics and Surveillance, Botnet and Malware, DDoS, and Intrusion Detection/Prevention; Ambient Cloud and Edge Computing, SDN, Wireless and Cellular Communication; Governance, Social Media, Mobile and Web, Data Privacy, Data Policy and Fake News.
The two-volume set CCIS 662 and CCIS 663 constitutes the refereed proceedings of the 7th Chinese Conference on Pattern Recognition, CCPR 2016, held in Chengdu, China, in November 2016.The 121 revised papers presented in two volumes were carefully reviewed and selected from 199 submissions. The papers are organized in topical sections on robotics; computer vision; basic theory of pattern recognition; image and video processing; speech and language; emotion recognition.
This comprehensive Research Handbook explores the wide variety of work conducted in legal semiotics to provide a broad understanding of how the law works through signs and symbols. Demonstrating that law is a strategical system of fluctuating signs, contributors critically analyse the ever-evolving conceptualisations of law and legal discourse.
This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Information Hiding, IH 2002, held in Noordwijkerhout, The Netherlands, in October 2002. The 27 revised full papers presented were carefully selected during two rounds of reviewing and revision from 78 submissions. The papers are organized in topical sections on information hiding and networking, anonymity, fundamentals of watermarking, watermarking algorithms, attacks on watermarking algorithms, steganography algorithms, steganalysis, and hiding information in unusual content.