نتایج جستجو
Intelligent Systems: Fusion, Tracking and Control (CSI, Control and Signal Image Processing Series)
G. W. Ng (GeeWah Ng), 2003
MULTIDIMENSIONAL SIGNAL, IMAGE, AND VIDEO PROCESSING AND CODING
John W. Woods, 2006
Real-Time Detection of Lines and Grids: By PClines and Other Approaches
Adam Herout, Markéta Dubská, Jiří Havel (auth.), 2013
Vision Systems - Segmentation and Pattern Recognition
Goro Obinata and Ashish Dutta
Information Hiding: Steganography and Watermarking - Attacks and Countermeasures
Neil F. Johnson; Zoran Duric; Sushil Jajodia, 2000
Techniques and Applications of Digital Watermarking and Content Protection
Michael Arnold, Stephen D. Wolthusen, Martin Schmucker, 2003
Proceedings of the 2nd International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2012
I.O. Lytvynenko (ed.), D.O. Terletskyi (ed.), 2012
Proceedings of the 3rd International Scientific Conference of Students and Young Scientists "Theoretical and Applied Aspects of Cybernetics" TAAC-2013
D.O. Terletskyi (ed.), A.A. Prashchur (ed.), I.O. Lytvynenko (ed.), 2013
Artificial Intelligence and Integrated Intelligent Information Systems: Emerging Technologies and Applications
Xuan F. Zha, Xuan F. Zha, 2006
Developments in Applied Artificial Intelligence: 15th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems IEA/AIE 2002 Cairns, Australia, June 17–20, 2002 Proceedings
Demetrios Michalopoulos, Chih-Kang Hu (auth.), Tim Hendtlass, Moonis Ali (eds.), 2002
Information Modelling and Knowledge Bases XVIII
M. DuzaÂ, H. Jaakkola, Y. Kiyoki and H. Kangassalo, Editors, 2007
Knowledge Management and Acquisition for Smart Systems and Services: 11th International Workshop, PKAW 2010, Daegue, Korea, August 20 - September 3, 2010. Proceedings
Tetsuya Yoshida, Kazuhiro Okatani (auth.), Byeong-Ho Kang, Debbie Richards (eds.), 2010
Model Checking and Artificial Intelligence: 4th Workshop, MoChArt IV, Riva del Garda, Italy, August 29, 2006, Revised Selected and Invited Papers
Piergiorgio Bertoli, Marco Bozzano (auth.), Stefan Edelkamp, Alessio Lomuscio (eds.), 2007
Advances in Cryptology — ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001 Proceedings
Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo (auth.), Colin Boyd (eds.), 2001
Advances in Cryptology — ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings
Arjen K. Lenstra, Adi Shamir, Jim Tomlinson (auth.), Yuliang Zheng (eds.), 2002
Advances in Cryptology — ASIACRYPT’98: International Conference on the Theory and Application of Cryptology and Information Security Beijing, China, October 18–22, 1998 Proceedings
Arjen K. Lenstra (auth.), Kazuo Ohta, Dingyi Pei (eds.), 1998
Cryptography and Security Services: Mechanisms and Applications
Manuel Mogollon, 2008
Cryptography and Security Services: Mechanisms and Applications
Manuel Mogollon, 2008
