This volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 19th IFIP/IEEE ...
اقرأ المزيد
This book constitutes the refereed proceedings of the Third International Workshop on Mining Complex Data, MCD 2007, held ...
اقرأ المزيد
Multimodal Processing and Interaction: Audio, Video and Text presents high quality, state-of-the-art research ideas and results ...
اقرأ المزيد
This volume contains the papers presented at NLDB 2008, the 13th Inter- tional Conference on Natural Language and Information ...
اقرأ المزيد
The technology of artifcial intelligence is increasing its importance thanks to the rapid growth of the Internet and computer ...
اقرأ المزيدThe book is structured in four parts: Part I “The Big Data Opportunity” explores the value potential of big data with ...
اقرأ المزيد
This two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 7th International Conference on Practical Aspects of Knowledge Management, ...
اقرأ المزيد
Constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
اقرأ المزيد
Constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2008, held ...
اقرأ المزيد
Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...
اقرأ المزيد
This book is organized in topical sections on data mining and knowledge discovery, wireless, sensor networks and grid, XML ...
اقرأ المزيد
This book is organized in topical sections on provenance: models and querying; provenance: visualization, failures, identity; ...
اقرأ المزيد
This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
اقرأ المزيد
Poor data quality can hinder or seriously damage the efficiency and effectiveness of organizations and businesses. The growing ...
اقرأ المزيد
This book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...
اقرأ المزيد
The book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
اقرأ المزيد
This book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...
اقرأ المزيد
This book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
اقرأ المزيد