This volume constitutes the refereed proceedings of the 5th International Workshop on Grid Economics and Business Models, ...
اقرأ المزيدThis book aims to strengthen and advance scientific and technological excellence in the area of Grid Computing. The main ...
اقرأ المزيدThis volume presents the accepted papers for the 4th International Conference on Grid and Cooperative Computing (GCC2005),held ...
اقرأ المزيدThis volume constitutes the proceedings of the 13th International Workshop on Groupware (CRIWG 2007). This workshop aims ...
اقرأ المزيدTopical sections include collaborative applications and group interaction, group awareness, computer supported collaborative ...
اقرأ المزيدThis book constitutes the refereed post-conference proceedings of the 14th International Workshop on Groupware: Design, Implementation, ...
اقرأ المزيدThis stimulating text/reference presents a philosophical exploration of the conceptual foundations of deep learning, presenting ...
اقرأ المزيدThe present book contains a collection of the best papers presented at the 5th International Conference on Interacción Persona ...
اقرأ المزيدBig Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, ...
اقرأ المزيدBig Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, ...
اقرأ المزيدThis Handbook presents a comprehensive and rigorous overview of the state-of-the-art on Smart Cities. It provides the reader ...
اقرأ المزيدDecision support systems have experienced a marked increase in attention and importance over the past 25 years. The aim of ...
اقرأ المزيدBegins with an overview of the technology landscape behind BERT. It takes you through the basics of NLP, including natural ...
اقرأ المزيدThis book constitutes the proceedings of the 12th International Conference on Human Haptic Sensing and Touch Enabled Computer ...
اقرأ المزيد“Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies ...
اقرأ المزيدHardening is the process of protecting a system against unknown threats. System administrators harden against that which ...
اقرأ المزيدHierarchical matrices are an efficient framework for large-scale fully populated matrices arising, e.g., from the finite ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 10th International Conference on Software Reuse, ICSR 2008, held in ...
اقرأ المزيدThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيدThe objective of this symposium is to exchange the latest research results in software, architecture, and applications in ...
اقرأ المزيد