While most of the current works in Artificial Intelligence (AI) focus on individual aspects of intelligence and cognition, ...
WeiterlesenOffers a fresh method of assessing and managing risks in SMEs, by adopting a multidisciplinary approach. In small and medium ...
WeiterlesenThis book covers methods based on a combination of granular computing, rough sets, and knowledge discovery in data mining ...
WeiterlesenThis book is organized in topical sections on logical and mathematical foundations, data analysis, data mining, decision ...
WeiterlesenConstitutes proceedings of the Second International Conference on Rough Sets and Knowledge Technology, RSKT 2007, held in ...
WeiterlesenThis volume contains the papers selected for presentation at the First Int- national Conference on Rough Sets and Knowledge ...
WeiterlesenThis book focus on five major research fields: computing theory and paradigms, knowledge technology, intelligent information ...
WeiterlesenThis book provides an overview of the field and introduces a number of different approaches to extracting rules from support ...
WeiterlesenThis book is organized in topical sections on rule engineering, rule-based methodologies and applications in policies, electronic ...
WeiterlesenThis book presents the proceedings of the 32nd Conference on Current Trends in Theory and Practice of Computer Science, held ...
WeiterlesenThis book is segmented into four topical sections on foundations of computer science; computing by nature; networks, security, ...
WeiterlesenThis book is organized in topical sections on applied topic maps in industry and administration, visualisation and representation ...
Weiterlesenspecial emphasis was given to lessons for future thinking about the contribution of agriculture to: 1) poverty alleviation ...
WeiterlesenThis book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...
WeiterlesenThis volume offers a critical examination of the growing pressure to apply scientific principles as a means to improve education. ...
WeiterlesenThis book trains the next generation of scientists representing different disciplines to leverage the data generated during ...
WeiterlesenThe present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
WeiterlesenThe main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- ...
WeiterlesenThis was the era of the ?rst university calculation centres that one accessed over a counter. One would deposit cards on ...
WeiterlesenThis book is organized in topical sections on peer-to-peer systems, overlay networks as well as resource and service management.
Weiterlesen