SpringerBriefs in computer science
Resource Information
The series SpringerBriefs in computer science represents a set of related resources, especially of a specified kind, found in University of Missouri Libraries.
The Resource
SpringerBriefs in computer science
Resource Information
The series SpringerBriefs in computer science represents a set of related resources, especially of a specified kind, found in University of Missouri Libraries.
- Label
- SpringerBriefs in computer science
203 Items in the Series SpringerBriefs in computer science
Context
Context of SpringerBriefs in computer scienceMembers
No resources found
No enriched resources found
- SpringerBriefs in computer science, 8
- 4G femtocells : resource allocation and interference management
- A brief history of cryptology and cryptographic algorithms
- A contrario line segment detection
- A general framework for reasoning on inconsistency
- A primer of multicast routing
- A primer of multicast routing
- A proof theory for description logics
- A survey of core research in information systems
- A survey of data leakage detection and prevention solutions
- A survey of data leakage detection and prevention solutions
- Agile anywhere : essays on agile projects and beyond
- Agile risk management
- Android malware
- Annual dynamics of daylight variability and contrast : a simulation-based approach to quantifying visual effects in architecture
- Applications of algebra to communications, control, and signal processing
- Architectures of small-cell networks and interference management
- Attachment transmission in wireless networks
- Auction design for the wireless spectrum market
- Automated configuration problem solving
- Automatic generation of combinatorial test data
- Automatic malware analysis : an emulator based approach
- Autonomic Computing Enabled Cooperative Networked Design
- Autonomic cooperative networking
- Autonomic cooperative networking
- Autonomous military robotics
- Autonomous robotics and deep learning
- Belief revision in non-classical logics
- Bluetooth security attacks : comparative analysis, attacks, and countermeasures
- Boosted statistical relational learners : from benchmarks to data-driven medicine
- Bootstrapping trust in modern computers
- Channel estimation for physical layer network coding systems
- Cognitive radio networks : dynamic resource allocation schemes
- Cognitive virtual network operator games
- Collaborative Web Hosting : Challenges and Research Directions
- Communication challenges and solutions in the smart grid
- Computational movement analysis
- Concepts, ontologies, and knowledge representation
- Concise computer mathematics : tutorials on theory and problems
- Context management for distributed and dynamic context-aware computing
- Context management for distributed and dynamic context-aware computing
- Cooperative device-to-device communication in cognitive radio cellular networks
- Cooperative networking in a heterogeneous wireless medium
- Countering brandjacking in the digital age : ... and other hidden risks to your brand
- Countering brandjacking in the digital age : ...and other hidden risks to your brand
- Criminal justice forecasts of risk : a machine learning approach
- Criminal justice forecasts of risk : a machine learning approach
- Cyber security : deterrence and IT protection for critical infrastructures
- Cyber-risk management
- Data center networks : topologies, architectures and fault-tolerance characteristics
- Data dissemination and query in mobile social networks
- Data dissemination and query in mobile social networks
- Data mining in large sets of complex data
- Data mining techniques in sensor networks : summarization, interpolation and surveillance
- Data-driven generation of policies
- Decentralized Reasoning in Ambient Intelligence
- Decentralized reasoning in ambient intelligence
- Demand-driven associative classification
- Digital pathology
- Distributed context-aware systems
- Distributed denial of service attack and defense
- Distributed denial of service attack and defense
- Distributed medium access control in wireless networks
- Distributed space-time coding
- Driver drowsiness detection : systems and solutions
- Dynamic cloud collaboration platform : a market-oriented approach
- Efficient algorithms for discrete wavelet transform : with applications to denoising and fuzzy inference systems
- Efficient algorithms for discrete wavelet transform : with applications to denoising and fuzzy inference systems
- Emergent Interfaces for Feature Modularization
- Enabling content distribution in vehicular ad hoc networks
- Enabling secure and privacy preserving communications in smart grids
- Energy detection for spectrum sensing in cognitive radio
- Energy-aware scheduling on multiprocessor platforms
- Energy-efficient area coverage for intruder detection in sensor networks
- Energy-efficient high performance computing : measurement and tuning
- Entropy guided transformation learning : algorithms and applications
- Entropy guided transformation learning : algorithms and applications
- Event-driven surveillance : possibilities and challenges
- Event-driven surveillance : possibilities and challenges
- Evolutionary game design
- Evolutionary game design
- Experience with technology : dynamics of user experience with mobile media devices
- Explaining algorithms using metaphors
- Fast compact algorithms and software for spline smoothing
- Feature coding for image representation and recognition
- From fault classification to fault tolerance for multi-agent systems
- Fundamentals of sketch-based passwords : a general framework
- GIS-based analysis of coastal lidar time-series
- Glazed panel construction with human-robot cooperation
- Graph-based clustering and data visualization algorithms
- Group cell architecture for cooperative communications
- Guide to Cisco routers configuration : becoming a router geek
- Guide to ILDJIT
- Guide to OSI and TCP/IP models
- Health informatics in the cloud
- High-performance computational solutions in protein bioinformatics
- Homomorphic encryption and applications
- Human action recognition with depth cameras
- ITIL® 2011 at a glance
- ITILʼ 2011 at a glance
- Image blending techniques and their application in underwater mosaicing
- Information-theoretic evaluation for computational biomedical ontologies
- Integrating 3D modeling, photogrammetry and design
- Interactive co-segmentation of objects in image collections
- Intermittently connected mobile ad hoc networks : from routing to content distribution
- Internet resource pricing models
- Interworking of wireless LANs and cellular networks
- Introduction to image processing using R : learning by examples
- Intrusion detection for IP-based multimedia communications over wireless networks
- JRuby Rails web application development
- Large group decision making : creating decision support approaches at scale
- Linear network error correction coding
- Location privacy preservation in cognitive radio networks
- Location privacy protection in mobile networks
- Lossy image compression : domain decomposition-based algorithms
- Maritime wideband communication networks : video transmission scheduling
- Markov Decision Processes and the Belief-Desire-Intention Model
- Markov models for handwriting recognition
- Middleware solutions for the internet of things
- Mobile authentication : problems and solutions
- Mobile web browsing using the cloud
- Modeling and analysis of voice and data in cognitive radio networks
- Modeling and simulating command and control : for organizations under extreme situations
- Modeling trust context in networks
- Morphological modeling of terrains and volume data
- Motion history images for action recognition and understanding
- Moving object detection using background subtraction
- Multipath TCP for user cooperation in wireless networks
- Network hardening : an automated approach to improving network security
- Network robustness under large-scale attacks
- Omnidirectional vision systems : calibration, feature extraction and 3D information
- On the mathematics of modelling, metamodelling, ontologies and modelling languages
- Open problems in spectral dimensionality reduction
- Peer-to-peer query processing over multidimensional data
- Peer-to-peer query processing over multidimensional data
- Performance evaluation software : moving object detection and tracking in videos
- Pervasive wireless environments : detecting and localizing user spoofing
- Physical layer approaches for securing wireless communication systems
- Power distribution and performance analysis for wireless communication networks
- Power distribution and performance analysis for wireless communication networks
- Primer on client-side web security
- Quantitative security risk assessment of enterprise networks
- Querying moving objects detected by sensor networks
- Querying over encrypted data in smart grids
- RFID as an infrastructure
- Radio resource management using geometric water-filling
- Rapid serial visual presentation : design for cognition
- Real-time detection of lines and grids : by PClines and other approaches
- Repairing and querying databases under aggregate constraints
- Resource Management in Utility and Cloud Computing
- Resource management for device-to-device underlay communication
- Rhodes framework for Android platform and BlackBerry® smartphones
- Robust motion detection in real-life scenarios
- Robust recognition via information theoretic learning
- Routing for wireless multi-hop networks
- Scalable parallel programming applied to H.264/AVC decoding
- Scalable parallel programming applied to H.264/AVC decoding
- Seamless and secure communications over heterogeneous wireless networks
- Secure IP mobility management for VANET
- Security and privacy in mobile social networks
- Security assessment in vehicular networks
- Security for Multi-hop Wireless Networks
- Security for cloud storage systems
- Security for wireless implantable medical devices
- Security-aware cooperation in cognitive radio networks
- Self-* and P2P for network management : design principles and case studies
- Semantic web-based intelligent geospatial web services
- Sentiment analysis for PTSD signals
- Service placement in ad hoc networks
- Service systems : concepts, modeling, and programming
- Service-Oriented Crowdsourcing : Architecture, Protocols and Algorithms
- Software similarity and classification
- Software similarity and classification
- Software testing in the cloud : migration and execution
- Spatial AutoRegression (SAR) model : parameter estimation techniques
- Spatial AutoRegression (SAR) model : parameter estimation techniques
- Spatio-temporal databases : complex motion pattern queries
- Spatio-temporal networks : modeling and algorithms
- Studies on urban vehicular ad-hoc networks
- Sustainable web ecosystem design
- Sustainable wireless networks
- Syntactic n-grams in computational linguistics
- The design of cloud workflow systems
- Time division multiple access for vehicular communications
- Time-of-flight cameras : principles, methods and applications
- Traffic measurement on the internet
- Traffic-sign recognition systems
- Transportation and information : trends in technology and policy
- Trustworthy execution on mobile devices
- Twitter data analytics
- Two-dimensional change detection methods : remote sensing applications
- Two-dimensional change detection methods : remote sensing applications
- Understanding high-dimensional spaces
- Unsupervised information extraction by text segmentation
- Variational regularization of 3D data : experiments with MATLAB®
- Video processing in the cloud
- Vision-based pedestrian protection systems for intelligent vehicles
- Visual indexing and retrieval
- Voice over IP security : a comprehensive survey of vulnerabilities and academic research
- Web proxy cache replacement strategies : simulation, implementation, and performance evaluation
- Wireless communications networks for the smart grid
- Wireless coordinated multicell systems : architectures and precoding designs
- Wireless sensor networks : distributed consensus estimation
- Wireless virtualization
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/mibIE77yv_M/" typeof="Series http://bibfra.me/vocab/lite/Series"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/mibIE77yv_M/">SpringerBriefs in computer science</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Series SpringerBriefs in computer science
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/mibIE77yv_M/" typeof="Series http://bibfra.me/vocab/lite/Series"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/mibIE77yv_M/">SpringerBriefs in computer science</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>