10% off all books and free delivery over £50
Buy from our bookstore and 25% of the cover price will be given to a school of your choice to buy more books. *15% of eBooks.

Biometrics, Computer Security Systems and Artificial Intelligence Applications

View All Editions (2)

The selected edition of this book is not available to buy right now.
Add To Wishlist
Write A Review

About

Biometrics, Computer Security Systems and Artificial Intelligence Applications Synopsis

The book to which I was asked by the editors to write a foreword is an interesting collection of contributions. It presents the extended versions of the authors' works already introduced at the International Multi-Conference on Advanced Computer Information and Security Systems ACS-CISIM 2005. These contributions had already been reviewed once before the conference for presentation at the conference while some of them passed another selection to be prepared in their current versions for this book. I am convinced the book will be of help to the researchers in the field of Computer Methods in Biometrics, Security Systems and Artificial Intelligence. They would find the contributions of other researchers of real benefit to them. I would encourage those who have the book in hands to read it. Professor Andrzej Salwicki Faculty of Mathematics, Informatics and Mechanics Warsaw University, Poland ACKNOWLEDGEMENTS The editors are thankfUl to all contributors whose works have proved to be of great interest to all participants of the International Conference ACS-CISIM, which was held in Elk, Poland in summer 2005. We also are greatly indebted to the Invited Speakers for their really worth listening and reading keynote talks.

About This Edition

ISBN: 9781441942128
Publication date:
Author: Khalid Saeed, Jerzy PejaÔs, Romuald Mosdorf
Publisher: Springer an imprint of Springer US
Format: Paperback
Pagination: 348 pages
Genres: Artificial intelligence
Pattern recognition
Image processing
Information theory
Coding theory and cryptology
Network hardware
Algorithms and data structures
Data encryption