: The asymmetric adversary poses a serious threat to civil and military facilities. Hence, the defence against such adversaries, the so-called anti asymmetric warfare, is of intere...
Advanced applications in fields like electronic publishing and telecooperation face the problem of handling multimedia information. Conventional database systems do not offer adeq...
The contemporary technological evolution requires higher levels of education and new skills from the work-force making people more conscious of the importance of being better educ...
Maria Helena Lima Baptista Braz, Sean W. M. Siquei...
Several secure computing hardware architectures using memory encryption and memory integrity checkers have been proposed during the past few years to provide applications with a t...
Earth observation technologies have developed rapidly during the last decades. Substantial amounts of earth observation data have been acquired and stored among the literature and...