The book is organized in topical sections on agents, application ontologies, applications, formal languages, foundational ...
اقرأ المزيدThis volume is a collection of my essays on Gustav von Schmoller (1838– 1917), Max Weber (1864–1920), and Joseph Alois ...
اقرأ المزيدClassifying objects into categories at different granularity levels, establishing links between known objects, and discovering ...
اقرأ المزيدThis book concisely brings together the key standards and best practices relating to modelling, querying, validating and ...
اقرأ المزيدThe LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...
اقرأ المزيدThis volume includes adaption/monitoring, model driven architecture, network services, service oriented architecture, business ...
اقرأ المزيدThe LNCS journal Transactions on Rough Sets is devoted to the entire spectrum of rough sets related issues, from logical ...
اقرأ المزيدTransformations and projections are used extensively in Computer Graphics, a field which is now a part of everyone’s lives ...
اقرأ المزيدThis book constitutes the thoroughly refereed postproceedings of the International Workshop on Trends in Enterprise Application ...
اقرأ المزيد“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
اقرأ المزيدThe book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...
اقرأ المزيدFabian Pfaffenberger evaluates the scientific usefulness of Twitter by considering several common survey and analysis methods. ...
اقرأ المزيدOver recent years most business processes have changed in various dimensions (e. g. , ?exibility, interconnectivity, coordination ...
اقرأ المزيدThe present volume represents the first comprehensive compilation of state-of-the-art research approaches to uncertainty ...
اقرأ المزيدA practical, no-nonsense guide to digital marketing, giving readers all the information they need to feel confident engaging ...
اقرأ المزيدThis book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
اقرأ المزيدThis book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...
اقرأ المزيدThe book offers topical sections on adaptive hypermedia, affective computing, data mining for personalization and cross-recommendation, ...
اقرأ المزيدThe first great graphics technology for the Web,VRML,has been mistaken for something else since its inception. Viewed variously ...
اقرأ المزيدThis pioneering book deals specifically with the visualization of the Second-Generation Web. Now in its second edition it ...
اقرأ المزيد