The aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal ...
اقرأ المزيدVast amounts of data are collected by service providers and system administ- tors, and are available in public information ...
اقرأ المزيدPrivacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...
اقرأ المزيدPro PerformancePoint Server 2007 is Microsoft's latest product in its line of business intelligence applications, a piece ...
اقرأ المزيدThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيدComprises all the single courses given as part of the First Summer School on Process Mining, PMSS 2022, which was held in ...
اقرأ المزيدThis open access book constitutes revised selected papers from the International Workshops held at the Third International ...
اقرأ المزيدThe papers address different development modes, roles in the value chain, stakeholders’ viewpoints, collaborative development, ...
اقرأ المزيدThis book constitutes the proceedings of the 29th European Symposium on Programming, ESOP 2020, which took place in Dublin, ...
اقرأ المزيدThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
اقرأ المزيدThis book is organized in topical sections on data mining and knowledge discovery, wireless, sensor networks and grid, XML ...
اقرأ المزيدThis book is organized in topical sections on provenance: models and querying; provenance: visualization, failures, identity; ...
اقرأ المزيدThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
اقرأ المزيدThis book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
اقرأ المزيدPoor data quality can hinder or seriously damage the efficiency and effectiveness of organizations and businesses. The growing ...
اقرأ المزيدMany decisions are required throughout the software development process. These decisions, and to some extent the decision-making ...
اقرأ المزيدThis book reports on a novel and comprehensive approach to the uptake of ICT in Schools. It focuses on key questions, pedagogically ...
اقرأ المزيدThis volume contains the tutorial papers of the Summer School “Reasoning Web,”July25–29,2005(http://reasoningweb. org). ...
اقرأ المزيدThis book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...
اقرأ المزيدThis book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
اقرأ المزيد