Advanced Computing and Systems for Security: Volume Three
No Customer Reviews
A heuristic framework for priority based nurse scheduling.- All Spanning Tree Generation Algorithm using Divide-and-Conquer and its Application in Network Capacity Planning Process.- Circuit Synthesis of Maximum Clique Problem by using Quantum Walk.- Abort-free STM: A Non-Blocking Concurrency Control Approach using Software Transactional Memory.- Graph problems performance comparison using Intel Xeon and Intel Xeon-Phi.- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle.- A Novel Image Steganographic Scheme using 8x8 Sudoku Puzzle.- Association Based Multi-Attribute Analysis to Construct Materialized View.- A new Method for Key Author Analysis in Research Professionals' Collaboration Network.- Single-shot Person Re-Identification by Spectral Matching of Symmetry-Driven Local Features.- Analysis of eavesdropping in QKD with Qutrit photon states.- Evaluating The Performance of A Chaos Based Partial Image Encryption Scheme.- Use of fusion biometric system based on keystroke dynamics and face image as a way to improve recognition system reliability.
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.