Intelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information ...
اقرأ المزيدIntelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...
اقرأ المزيدIntelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...
اقرأ المزيدIn the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development ...
اقرأ المزيدThis book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, ...
اقرأ المزيدThis book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism ...
اقرأ المزيدThe rapid growth in electronic systems in the past decade has boosted research in the area of computational intelligence. ...
اقرأ المزيدThe rapid growth in electronic systems in the past decade has boosted research in the area of computational intelligence. ...
اقرأ المزيدExplores the economics and technology of AI, IOT, and 5G integration Delivers a comprehensive technological and economic ...
اقرأ المزيدWeb personalizationcan be de?ned as any set of actions that can tailor the Web experience to a particular user or set of ...
اقرأ المزيدincludes high-quality research on various aspects of intelligent interactive multimedia technologies in healthcare services. ...
اقرأ المزيدExplores the concepts and techniques of IoT, AI, and blockchain. Also discussed is the possibility of applying blockchain ...
اقرأ المزيدThis book cover a wide range of topics from a technology to a business perspective and include among others hardware, software ...
اقرأ المزيدOn behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...
اقرأ المزيدLEGAL PROGRAMMING: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond provides ...
اقرأ المزيدThese proceedings contain the papers presented at the 3rd International S- posium on Location- and Context-Awareness in September ...
اقرأ المزيدContext-awareness is one of the drivers of the ubiquitous computing paradigm. Well-designed context modeling and context ...
اقرأ المزيدnd These proceedings contain the papers presented at the 2 International Workshop on Location- and Context-Awareness in May ...
اقرأ المزيدCovers the multidimensional perspective of machine learning through the perspective of cloud computing and Internet of Things ...
اقرأ المزيد