For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting ...
Weiterlesen
This volume contains works at the intersection of database and programming language research.It also cover algorithms, XML ...
Weiterlesen
This volume contains works at the intersection of database and programming language research.It also cover algorithms, XML ...
Weiterlesen
This book constitutes the refereed proceedings of the 11th International Conference on Database Systems for Advanced Applications, ...
Weiterlesen
This book constitutes the refereed proceedings of the 13th International Conference on Database Systems for Advanced Applications, ...
Weiterlesen
This volume collects the papers presented at the 10th International Conference on Database Theory, ICDT 2005, held during ...
Weiterlesen
The papers are organized in topical sections on information integration and peer to peer, axiomatizations for XML, expressive ...
Weiterlesen
Constitutes the proceedings of the Third International XML Database Symposium, XSym 2005, held in Trondheim, Norway in August ...
Weiterlesen
This book constitutes the refereed proceedings of the 4th International Workshop on Databases in Networked Information Systems, ...
Weiterlesen
A leitmotif in the evolution of programming paradigms has been the level and extent of parametrisation that is facilitated ...
Weiterlesen
A leitmotif in the evolution of programming paradigms has been the level and extent of parametrisation that is facilitated ...
Weiterlesen
The book concentrates on decision procedures for first-order theories that are commonly used in automated verification and ...
Weiterlesen
This textbook for students and practitioners presents a practical approach to decomposition techniques in optimization. It ...
Weiterlesen
Discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware ...
Weiterlesen
Presents a comprehensive comparison of the performance of stochastic optimization algorithms Includes an introduction to ...
WeiterlesenDeep learning has been successfully applied to solve various complex problems ranging from big data analytics to computer ...
WeiterlesenThe technology used to create such digital content has quickly become accessible to the masses, such as “DEEPFAKE.” Deep ...
WeiterlesenThe rise of large language models (LLMs) and the increasing sophistication of deepfake images have made detecting synthetic ...
Weiterlesen
Deformable Models: Theory and Biomaterial Applications is the second installation in the two-volume set Deformable Models ...
Weiterlesen
Deformable Models: Biomedical and Clinical Applications is the first entry in the two-volume set which provides a wide cross-section ...
Weiterlesen