SpringerCompSci (@springercompsci) 's Twitter Profile
SpringerCompSci

@springercompsci

All things Computer Science from your global Springer team. Keep updated with the latest CS book/journal news, and which conferences we’ll be attending.

ID: 538926991

linkhttps://www.springer.com/gp/computer-science calendar_today28-03-2012 10:33:28

5,5K Tweet

4,4K Followers

969 Following

Katherine Moretti (@kmoretticompsci) 's Twitter Profile Photo

The International Journal of Computer Vision is happy to announce our 2024 Outstanding Reviewer award winners. This year there were two recipients; please join me in congratulating Evangelos Kazakos (Czech Institute of Informatics) and Ke Xu (City University of Hong Kong)!

Katherine Moretti (@kmoretticompsci) 's Twitter Profile Photo

We are excited to announce that the winner of IJCV's 2024 Outstanding Board Member award is Karteek Alahari (Inria, France). Thank you for your work on behalf of IJCV, and thank you to all of our diligent board members and reviewers who supported IJCV in 2024! Karteek Alahari

SpringerCompSci (@springercompsci) 's Twitter Profile Photo

New monograph released on the foundations of #Deep Learning, by Fengxiang He and Dacheng Tao, link.springer.com/book/10.1007/9….

New monograph released on the foundations of #Deep Learning, by Fengxiang He and Dacheng Tao, link.springer.com/book/10.1007/9….
SpringerCompSci (@springercompsci) 's Twitter Profile Photo

A new study by Yeşilkaya et al. in the EURASIP Journal on Information Security proposes a deep learning approach to identity verification using wearable ECGs in devices such as smart watches. Learn more here: doi.org/10.1186/s13635…

A new study by Yeşilkaya et al. in the EURASIP Journal on Information Security proposes a deep learning approach to identity verification using wearable ECGs in devices such as smart watches. Learn more here: doi.org/10.1186/s13635…
SpringerCompSci (@springercompsci) 's Twitter Profile Photo

A new study by Belguechi et al. in EURASIP Journal on Information Security presents a method for keeping personal information safe using a cancelable biometrics scheme that protects from similarity-based attacks. Learn more here: doi.org/10.1186/s13635…

A new study by Belguechi et al. in EURASIP Journal on Information Security presents a method for keeping personal information safe using a cancelable biometrics scheme that protects from similarity-based attacks. Learn more here: doi.org/10.1186/s13635…
Katherine Moretti (@kmoretticompsci) 's Twitter Profile Photo

The May 2025 issue of the International Journal of Computer Vision is out now. Access the issue here: link.springer.com/journal/11263/…

The May 2025 issue of the International Journal of Computer Vision is out now. Access the issue here: link.springer.com/journal/11263/…
SpringerCompSci (@springercompsci) 's Twitter Profile Photo

A new study by Mathivanan et al. in the Journal of Big Data presents a method of detecting brain tumors using public MRI data and hybrid deep learning to achieve a classification accuracy of over 95%. Learn more here: doi.org/10.1186/s40537…

A new study by Mathivanan et al. in the Journal of Big Data presents a method of detecting brain tumors using public MRI data and hybrid deep learning to achieve a classification accuracy of over 95%. Learn more here: doi.org/10.1186/s40537…
SpringerCompSci (@springercompsci) 's Twitter Profile Photo

Springer author Pankay Jalote with his newly published second edition of his book: link.springer.com/book/10.1007/9… . #icse2025

Springer author Pankay Jalote with his newly published second edition of his book: link.springer.com/book/10.1007/9…  . #icse2025
SpringerCompSci (@springercompsci) 's Twitter Profile Photo

Elisa Yumi Nakagawa proudly presenting her book at #icse2025. You may also read the book here: link.springer.com/book/10.1007/9…

Elisa Yumi Nakagawa proudly presenting her book at #icse2025. You may also read the book here: link.springer.com/book/10.1007/9…
SpringerCompSci (@springercompsci) 's Twitter Profile Photo

Andrej Wasowski and Thorsten Berger are proudly presenting their book at #icse2025 in Ottawa. You may access the book here: link.springer.com/book/10.1007/9…

Andrej Wasowski and Thorsten Berger are proudly presenting their book at #icse2025 in Ottawa. You may access the book here: link.springer.com/book/10.1007/9…
SpringerCompSci (@springercompsci) 's Twitter Profile Photo

Rashina Hoda (on the left) presenting her book "Qualitative Research with Socio-Technical Grounded Theory" at a dedicated launch event at #icse2025. Feel free to access the book here: link.springer.com/book/10.1007/9…

Rashina Hoda (on the left) presenting her book "Qualitative Research with Socio-Technical Grounded Theory" at a dedicated launch event at #icse2025. Feel free to access the book here: link.springer.com/book/10.1007/9…
SpringerCompSci (@springercompsci) 's Twitter Profile Photo

Author Gouri Ginde and Springer editor Ralf Gerstner present the new “Handbook on Natural Language Processing for Requirements Engineering” at #icse2025 this week. Link to book: link.springer.com/book/10.1007/9…

Author Gouri Ginde and Springer editor Ralf Gerstner present the new “Handbook on Natural Language Processing for Requirements Engineering” at #icse2025 this week. Link to book: link.springer.com/book/10.1007/9…
SpringerCompSci (@springercompsci) 's Twitter Profile Photo

Hot off the press: Klaus Pohl with the new edition of his widely used textbook on requirements engineering at #icse2025. Link to book: link.springer.com/book/978366269… , and teaching slides available under requirements-book.com

Hot off the press: Klaus Pohl with the new edition of his widely used textbook on requirements engineering at #icse2025. Link to book: link.springer.com/book/978366269… , and teaching slides available under requirements-book.com
SpringerCompSci (@springercompsci) 's Twitter Profile Photo

AI can be a black box. A new study by Arreche et al. in the EURASIP Journal on Information Security compares many different explainable AI methods to determine which AI solutions work best for stopping network intrusion. Learn more here: doi.org/10.1186/s13635…

AI can be a black box. A new study by Arreche et al. in the EURASIP Journal on Information Security compares many different explainable AI methods to determine which AI solutions work best for stopping network intrusion. Learn more here: doi.org/10.1186/s13635…
Katherine Moretti (@kmoretticompsci) 's Twitter Profile Photo

The June issue of IJCV is out now, featuring 5 #OpenAccess articles. Access the Table of Contents and Issue here: link.springer.com/journal/11263/…

The June issue of IJCV is out now, featuring 5 #OpenAccess articles. Access the Table of Contents and Issue here: link.springer.com/journal/11263/…
SpringerCompSci (@springercompsci) 's Twitter Profile Photo

Hanspeter Mössenböck proudly presents the English (updated) translation of his textbook on “Compiler Construction” link.springer.com/book/10.1007/9…

Hanspeter Mössenböck proudly presents the English (updated) translation of his textbook on “Compiler Construction” link.springer.com/book/10.1007/9…
SpringerCompSci (@springercompsci) 's Twitter Profile Photo

A new paper by Zhang et al. in the Journal of Big Data presents a machine learning model that proactively identifies phishing threats to online users with up to 98% accuracy. Learn more here: doi.org/10.1186/s40537…

A new paper by Zhang et al. in the Journal of Big Data presents a machine learning model that proactively identifies phishing threats to online users with up to 98% accuracy. Learn more here: doi.org/10.1186/s40537…
Katherine Moretti (@kmoretticompsci) 's Twitter Profile Photo

While you're attending #CVPR2025 make sure to check out the June 2025 issue of the International Journal of Computer Vision! The articles in the June issue are freely accessible for the duration of CVPR, until June 16: link.springer.com/journal/11263/… #CVPR2025

While you're attending #CVPR2025 make sure to check out the June 2025 issue of the International Journal of Computer Vision! The articles in the June issue are freely accessible for the duration of CVPR, until June 16: link.springer.com/journal/11263/… <a href="/CVPR/">#CVPR2025</a>
Katherine Moretti (@kmoretticompsci) 's Twitter Profile Photo

Another successful IJCV board meeting in the books at #CVPR2025 — A sincere thank you to all of our board members for attending and for continued support of the journal!

Another successful IJCV board meeting in the books at #CVPR2025 — A sincere thank you to all of our board members for attending and for continued support of the journal!
SpringerCompSci (@springercompsci) 's Twitter Profile Photo

A new paper by K. Singamaneni in the EURASIP Journal on Information Security proposes a new lightweight method for securing transactions in resource constrained environments due to it’s robust post quantum security and low energy usage. Learn more here: doi.org/10.1186/s13635…

A new paper by K. Singamaneni in the EURASIP Journal on Information Security proposes a new lightweight method for securing transactions in resource constrained environments due to it’s robust post quantum security and low energy usage. Learn more here: doi.org/10.1186/s13635…