This book reports on a novel and comprehensive approach to the uptake of ICT in Schools. It focuses on key questions, pedagogically ...
اقرأ المزيد
The transition towards exascale computing has resulted in major transformations in computing paradigms. The need to analyze ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 10th IFIP/IEEE International Conference on Management of Multimedia ...
اقرأ المزيد
This state-of-the-art contributed volume presents a series of peer-reviewed survey articles written by international leading ...
اقرأ المزيد
This book focuses on core functionalities for wireless real-time multi-hop networking with TDMA (time-division multiple access) ...
اقرأ المزيد
This book explores the dataspace paradigm as a best-effort approach to data management within data ecosystems. It establishes ...
اقرأ المزيد
This book contains a collection of thoroughly revised tutorial papers based on lectures given by leading researchers at the ...
اقرأ المزيد
This volume contains the tutorial papers of the Summer School “Reasoning Web,”July25–29,2005(http://reasoningweb. org). ...
اقرأ المزيد
This book presents thoroughly arranged tutorial papers corresponding to lectures given by leading researchers at the Second ...
اقرأ المزيد
This book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...
اقرأ المزيد
The present book is a festschrift in honor of Luigia Carlucci Aiello. The 18 articles included are written by former students, ...
اقرأ المزيد
This book constitutes the thoroughly refereed and extended post-proceedings of the 11th Annual ERCIM International Workshop ...
اقرأ المزيد
Constitutes the extended post-proceedings of the ERCIM/CoLogNet International Workshop on Constraint Satisfaction and Constraint ...
اقرأ المزيد
Privacy in statistical databases is a discipline whose purpose is to provide - lutions to the con?ict between the increasing ...
اقرأ المزيد
This book address all aspects of constraint and logic programming, including foundational issues, implementation techniques, ...
اقرأ المزيد
Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. Papers cover ...
اقرأ المزيد
This book presents the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took ...
اقرأ المزيد
This book presents the proceed-ings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID2006), which took ...
اقرأ المزيد
This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
اقرأ المزيد
This book contains a selection of papers presented at a Symposium organized under the aegis of COST Telecommunications Action ...
اقرأ المزيد