This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...
اقرأ المزيد“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
اقرأ المزيدThe book covers not only practical aspects but also the underlying theoretical approaches. It also covers the fundamentals ...
اقرأ المزيدFabian Pfaffenberger evaluates the scientific usefulness of Twitter by considering several common survey and analysis methods. ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...
اقرأ المزيدThe book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
اقرأ المزيدUranium is an element to be found ubiquitous in rock, soil, and water. Uranium concentrations in natural ground water can ...
اقرأ المزيدSubject of the book is Uranium and its migration in aquatic environments. The following subjects are emphasised: Uranium ...
اقرأ المزيدThese papers address the latest research and development efforts and highlight the human aspects of design and use of computing ...
اقرأ المزيدThe book offers topical sections on adaptive hypermedia, affective computing, data mining for personalization and cross-recommendation, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 11th International Conference on User Modeling, UM 2007, held in Corfu, ...
اقرأ المزيدTthis volume are organized in topical sections on data acquisition and modelling, visualization methods / audio, sensors ...
اقرأ المزيدPresents case studies that emphasize reliability and validity in different examples of qualitative, quantitative and mixed ...
اقرأ المزيدThis book is organized in topical sections on static and dynamic processing of faces, facial expressions and gaze as well ...
اقرأ المزيدThe volume is structured in three parts on theory and methodologies, techniques, and tools and applications.
اقرأ المزيدThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
اقرأ المزيدThis book addresses the processes related to mine abandonment from a hydrogeological perspective. The book gives some key ...
اقرأ المزيدWeb community, defined as a set of Web-based documents with its own logical structure, is a flexible and efficient approach ...
اقرأ المزيدWeb mining aims to discover u- ful information or knowledge from Web hyperlinks, page contents, and - age logs. Based on ...
اقرأ المزيدThis book constitutes the proceedings of the 7th International Conference on Web Information Systems Engineering, WISE 2006, ...
اقرأ المزيد