While most of the current works in Artificial Intelligence (AI) focus on individual aspects of intelligence and cognition, ...
اقرأ المزيدOffers a fresh method of assessing and managing risks in SMEs, by adopting a multidisciplinary approach. In small and medium ...
اقرأ المزيدThis book covers methods based on a combination of granular computing, rough sets, and knowledge discovery in data mining ...
اقرأ المزيدThis book is organized in topical sections on logical and mathematical foundations, data analysis, data mining, decision ...
اقرأ المزيدConstitutes proceedings of the Second International Conference on Rough Sets and Knowledge Technology, RSKT 2007, held in ...
اقرأ المزيدThis volume contains the papers selected for presentation at the First Int- national Conference on Rough Sets and Knowledge ...
اقرأ المزيدThis book focus on five major research fields: computing theory and paradigms, knowledge technology, intelligent information ...
اقرأ المزيدThis book provides an overview of the field and introduces a number of different approaches to extracting rules from support ...
اقرأ المزيدThis book is organized in topical sections on rule engineering, rule-based methodologies and applications in policies, electronic ...
اقرأ المزيدThis book presents the proceedings of the 32nd Conference on Current Trends in Theory and Practice of Computer Science, held ...
اقرأ المزيدThis book is segmented into four topical sections on foundations of computer science; computing by nature; networks, security, ...
اقرأ المزيدThis book is organized in topical sections on applied topic maps in industry and administration, visualisation and representation ...
اقرأ المزيدspecial emphasis was given to lessons for future thinking about the contribution of agriculture to: 1) poverty alleviation ...
اقرأ المزيدThis book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...
اقرأ المزيدThis volume offers a critical examination of the growing pressure to apply scientific principles as a means to improve education. ...
اقرأ المزيدThis book trains the next generation of scientists representing different disciplines to leverage the data generated during ...
اقرأ المزيدThe present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
اقرأ المزيدThe main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- ...
اقرأ المزيدThis was the era of the ?rst university calculation centres that one accessed over a counter. One would deposit cards on ...
اقرأ المزيدThis book is organized in topical sections on peer-to-peer systems, overlay networks as well as resource and service management.
اقرأ المزيد