The book is organized in topical sections on agents, application ontologies, applications, formal languages, foundational ...
WeiterlesenThis volume is a collection of my essays on Gustav von Schmoller (1838– 1917), Max Weber (1864–1920), and Joseph Alois ...
WeiterlesenClassifying objects into categories at different granularity levels, establishing links between known objects, and discovering ...
WeiterlesenThis book concisely brings together the key standards and best practices relating to modelling, querying, validating and ...
WeiterlesenThe LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...
WeiterlesenThis volume includes adaption/monitoring, model driven architecture, network services, service oriented architecture, business ...
WeiterlesenThe LNCS journal Transactions on Rough Sets is devoted to the entire spectrum of rough sets related issues, from logical ...
WeiterlesenTransformations and projections are used extensively in Computer Graphics, a field which is now a part of everyone’s lives ...
WeiterlesenThis book constitutes the thoroughly refereed postproceedings of the International Workshop on Trends in Enterprise Application ...
Weiterlesen“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
WeiterlesenThe book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...
WeiterlesenFabian Pfaffenberger evaluates the scientific usefulness of Twitter by considering several common survey and analysis methods. ...
WeiterlesenOver recent years most business processes have changed in various dimensions (e. g. , ?exibility, interconnectivity, coordination ...
WeiterlesenThe present volume represents the first comprehensive compilation of state-of-the-art research approaches to uncertainty ...
WeiterlesenA practical, no-nonsense guide to digital marketing, giving readers all the information they need to feel confident engaging ...
WeiterlesenThis book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
WeiterlesenThis book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...
WeiterlesenThe book offers topical sections on adaptive hypermedia, affective computing, data mining for personalization and cross-recommendation, ...
WeiterlesenThe first great graphics technology for the Web,VRML,has been mistaken for something else since its inception. Viewed variously ...
WeiterlesenThis pioneering book deals specifically with the visualization of the Second-Generation Web. Now in its second edition it ...
Weiterlesen