For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting ...
WeiterlesenThis volume contains works at the intersection of database and programming language research.It also cover algorithms, XML ...
WeiterlesenThis volume contains works at the intersection of database and programming language research.It also cover algorithms, XML ...
WeiterlesenThis book constitutes the refereed proceedings of the 11th International Conference on Database Systems for Advanced Applications, ...
WeiterlesenThis book constitutes the refereed proceedings of the 13th International Conference on Database Systems for Advanced Applications, ...
WeiterlesenThis volume collects the papers presented at the 10th International Conference on Database Theory, ICDT 2005, held during ...
WeiterlesenThe papers are organized in topical sections on information integration and peer to peer, axiomatizations for XML, expressive ...
WeiterlesenConstitutes the proceedings of the Third International XML Database Symposium, XSym 2005, held in Trondheim, Norway in August ...
WeiterlesenThis book constitutes the refereed proceedings of the 4th International Workshop on Databases in Networked Information Systems, ...
WeiterlesenA leitmotif in the evolution of programming paradigms has been the level and extent of parametrisation that is facilitated ...
WeiterlesenA leitmotif in the evolution of programming paradigms has been the level and extent of parametrisation that is facilitated ...
WeiterlesenThe book concentrates on decision procedures for first-order theories that are commonly used in automated verification and ...
WeiterlesenThis textbook for students and practitioners presents a practical approach to decomposition techniques in optimization. It ...
WeiterlesenDiscusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware ...
WeiterlesenPresents a comprehensive comparison of the performance of stochastic optimization algorithms Includes an introduction to ...
WeiterlesenDeep learning has been successfully applied to solve various complex problems ranging from big data analytics to computer ...
WeiterlesenThe technology used to create such digital content has quickly become accessible to the masses, such as “DEEPFAKE.” Deep ...
WeiterlesenThe rise of large language models (LLMs) and the increasing sophistication of deepfake images have made detecting synthetic ...
WeiterlesenDeformable Models: Theory and Biomaterial Applications is the second installation in the two-volume set Deformable Models ...
WeiterlesenDeformable Models: Biomedical and Clinical Applications is the first entry in the two-volume set which provides a wide cross-section ...
Weiterlesen