Search Results for - Narrowed by: Computer Imaging, Vision, Pattern Recognition and Graphics. - Computer science. - Data Structures, Cryptology and Information Theory. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bImaging$00252C$002bVision$00252C$002bPattern$002bRecognition$002band$002bGraphics.$002509Computer$002bImaging$00252C$002bVision$00252C$002bPattern$002bRecognition$002band$002bGraphics.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bscience.$002509Computer$002bscience.$0026qf$003dSUBJECT$002509Subject$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$002509Data$002bStructures$00252C$002bCryptology$002band$002bInformation$002bTheory.$0026ps$003d300? 2024-06-20T01:02:17Z Digital Watermarking 6th International Workshop, IWDW 2007 Guangzhou, China, December 3-5, 2007 Proceedings ent://SD_ILS/0/SD_ILS:503859 2024-06-20T01:02:17Z 2024-06-20T01:02:17Z by&#160;Shi, Yun Q. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-92238-4">http://dx.doi.org/10.1007/978-3-540-92238-4</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Biometrics ent://SD_ILS/0/SD_ILS:501662 2024-06-20T01:02:17Z 2024-06-20T01:02:17Z by&#160;Jain, Anil K. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-71041-9">http://dx.doi.org/10.1007/978-0-387-71041-9</a><br/>Format:&#160;Electronic Resources<br/> VizSEC 2007 Proceedings of the Workshop on Visualization for Computer Security ent://SD_ILS/0/SD_ILS:503340 2024-06-20T01:02:17Z 2024-06-20T01:02:17Z by&#160;Goodall, John R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-78243-8">http://dx.doi.org/10.1007/978-3-540-78243-8</a><br/>Format:&#160;Electronic Resources<br/> Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings ent://SD_ILS/0/SD_ILS:503670 2024-06-20T01:02:17Z 2024-06-20T01:02:17Z by&#160;Goodall, John R. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-540-85933-8">http://dx.doi.org/10.1007/978-3-540-85933-8</a><br/>Format:&#160;Electronic Resources<br/> Reliable Face Recognition Methods System Design, Impementation and Evaluation ent://SD_ILS/0/SD_ILS:505522 2024-06-20T01:02:17Z 2024-06-20T01:02:17Z by&#160;Wechsler, Harry. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-38464-1">http://dx.doi.org/10.1007/978-0-387-38464-1</a><br/>Format:&#160;Electronic Resources<br/> Handbook of Multibiometrics ent://SD_ILS/0/SD_ILS:505186 2024-06-20T01:02:17Z 2024-06-20T01:02:17Z by&#160;Ross, Arun A. author.<br/><a href="http://dx.doi.org/10.1007/0-387-33123-9">http://dx.doi.org/10.1007/0-387-33123-9</a><br/>Format:&#160;Electronic Resources<br/> Biometrics, Computer Security Systems and Artificial Intelligence Applications ent://SD_ILS/0/SD_ILS:505426 2024-06-20T01:02:17Z 2024-06-20T01:02:17Z by&#160;Saeed, Khalid. editor.<br/><a href="http://dx.doi.org/10.1007/978-0-387-36503-9">http://dx.doi.org/10.1007/978-0-387-36503-9</a><br/>Format:&#160;Electronic Resources<br/> Human Identification Based on Gait ent://SD_ILS/0/SD_ILS:504923 2024-06-20T01:02:17Z 2024-06-20T01:02:17Z by&#160;Nixon, Mark S. author.<br/><a href="http://dx.doi.org/10.1007/978-0-387-29488-9">http://dx.doi.org/10.1007/978-0-387-29488-9</a><br/>Format:&#160;Electronic Resources<br/> Understanding Intrusion Detection Through Visualization ent://SD_ILS/0/SD_ILS:504678 2024-06-20T01:02:17Z 2024-06-20T01:02:17Z by&#160;Axelsson, Stefan. author.<br/><a href="http://dx.doi.org/10.1007/0-387-27636-X">http://dx.doi.org/10.1007/0-387-27636-X</a><br/>Format:&#160;Electronic Resources<br/> Parallel and Distributed Computing: Applications and Technologies 5th International Conference, PDCAT 2004, Singapore, December 8-10, 2004. Proceedings ent://SD_ILS/0/SD_ILS:509720 2024-06-20T01:02:17Z 2024-06-20T01:02:17Z by&#160;Liew, Kim-Meow. editor.<br/><a href="http://dx.doi.org/10.1007/b103538">http://dx.doi.org/10.1007/b103538</a><br/>Format:&#160;Electronic Resources<br/> Image and Video Encryption From Digital Rights Management to Secured Personal Communication. ent://SD_ILS/0/SD_ILS:504166 2024-06-20T01:02:17Z 2024-06-20T01:02:17Z by&#160;SpringerLink (Online service)<br/><a href="http://dx.doi.org/10.1007/b101495">http://dx.doi.org/10.1007/b101495</a><br/>Format:&#160;Electronic Resources<br/>