This book (CCIS 837) constitutes the refereed proceedings of the Second International Conference on Soft Computing Systems, ICSCS 2018, held in Sasthamcotta, India, in April 2018.
This book features research work presented at the 2nd International Conference on Data Engineering and Communication Technology (ICDECT) held on December 15-16, 2017 at Symbiosis International University, Pune, Maharashtra, India.
The book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018) held at the University of Engineering & Management, Kolkata, India, on February 23-25, 2018.
The book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018) held at the University of Engineering & Management, Kolkata, India, on February 23-25, 2018.
This book constitutes the refereed proceedings of the Second International Conference on Smart Trends in Information Technology and Computer Communications, SmartCom 2017, held in Pune, India, in August 2017.
The book includes selected high-quality research papers presented at the Third International Congress on Information and Communication Technology held at Brunel University, London on February 27-28, 2018.
This book contains selected papers from the 9th International Conference on Information Science and Applications (ICISA 2018) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology.
This two-volume set (CCIS 848 and CCIS 849) constitutes the thoroughly refereed proceedings of the 5th International Conference Geo-Spatial Knowledge and Intelligence, GSKI 2017, held in Chiang Mai, Thailand, in December 2018.
This two-volume set (CCIS 848 and CCIS 849) constitutes the thoroughly refereed proceedings of the 5th International Conference Geo-Spatial Knowledge and Intelligence, GSKI 2017, held in Chiang Mai, Thailand, in December 2018.
This book constitutes the proceedings of the Third International Conference on Computational Intelligence, Cyber Security, and Computational Models, ICC3 2017, which was held in Coimbatore, India, in December 2017.
This book constitutes the proceedings of the 4th International Conference on Mathematics and Computing, ICMC 2018, held in Varanasi, India, in January 2018.
The book provides insights into International Conference on Smart Innovations in Communications and Computational Sciences (ICSICCS 2017) held at North West Group of Institutions, Punjab, India.
The book provides insights into International Conference on Smart Innovations in Communications and Computational Sciences (ICSICCS 2017) held at North West Group of Institutions, Punjab, India.
This book constitutes the refereed proceedings of the 13th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2017, held in Beijing, China, in December 2017.
This book contains extended version of selected works that have been discussed and presented in the fourth International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2017) held in Patna, India during March 17-19, 2017.
This book contains extended version of selected works that have been discussed and presented in the fourth International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2017) held in Patna, India during March 17-19, 2017.
This book presents the proceedings of the Conference on Algorithms and Applications (ALAP 2018), which focuses on various areas of computing, like distributed systems and security, big data and analytics and very-large-scale integration (VLSI) design.
This book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2016, held in Taichung, Taiwan, in July 2016.
This volume constitutes the refereed proceedings of the Second International Conference on Intelligent Information Technologies, ICIIT 2017, held in Chennai, India, in December 2017.
This book gathers selected papers from the Second International Symposium on Software Reliability, Industrial Safety, Cyber Security and Physical Protection of Nuclear Power Plant, held in Chengdu, China on August 23-25, 2017.
This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017.
This book constitutes the refereed proceedings of the 5th International Symposium on Security in Computing and Communications, SSCC 2017, held in Manipal, India, in September 2017.
This is the second volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in the field.
This is the first volume of proceedings including selected papers from the International Conference on IT Convergence and Security (ICITCS) 2017, presenting a snapshot of the latest issues encountered in this field.
This book constitutes the refereed proceedings of the 8th International Symposium on Parallel Architecture, Algorithm and Programming, PAAP 2017, held in Haikou, China, in June 2017.
The two volume set CCIS 775 and 776 constitutes the refereed proceedings of the First International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2017, held in Kolkata, India, in March 2017.
The two volume set CCIS 775 and 776 constitutes the refereed proceedings of the First International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2017, held in Kolkata, India, in March 2017.
This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017.
This book constitutes the proceedings of the Third International Conference on Mathematics and Computing, ICMC 2017, held in Haldia, India, in January 2017.
This book contains selected papers from the 8th International Conference on Information Science and Applications (ICISA 2017) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology.
This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India.
This book presents extended versions of papers originally presented and discussed at the 3rd International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2016) held from August 12 to 14, 2016 in Kolkata, India.
These proceedings present the latest information on software reliability, industrial safety, cyber security, physical protection, testing and verification for nuclear power plants.
This book constitutes the refereed proceedings of the International Conference on Applications and Techniques in Information Security, ATIS 2016, held in Cairns, Australia, October 2016.
This book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016.
This book presents the state-of-the-arts application of digital watermarking in audio, speech, image, video, 3D mesh graph, text, software, natural language, ontology, network stream, relational database, XML, and hardware IPs.
The book covers a wide range of topics in Computer Science and Information Technology including swarm intelligence, artificial intelligence, evolutionary algorithms, and bio-inspired algorithms.
This two-volume book contains research work presented at the First International Conference on Data Engineering and Communication Technology (ICDECT) held during March 10-11, 2016 at Lavasa, Pune, Maharashtra, India.
This two-volume book contains research work presented at the First International Conference on Data Engineering and Communication Technology (ICDECT) held during March 10-11, 2016 at Lavasa, Pune, Maharashtra, India.
This book contains selected papers from the 7th InternationalConference on Information Science and Applications (ICISA 2016) and provides asnapshot of the latest issues encountered in technical convergence andconvergences of security technology.
This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes.
This book presents the combined proceedings of the 7th International Conference onComputer Science and its Applications (CSA-15) and the International Conference onUbiquitous Information Technologies and Applications (CUTE 2015), both held in Cebu, Philippines, December 15 - 17, 2015.