This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism ...
WeiterlesenConstitutes the refereed proceedings of the 6th International Conference on Intelligent Data Engineering and Automated Learning, ...
WeiterlesenWeb personalizationcan be de?ned as any set of actions that can tailor the Web experience to a particular user or set of ...
WeiterlesenTechnology has been found to facilitate humankind's life. Hence, there is a new technique almost every day. One of the most ...
WeiterlesenAs a result of the progress in information and communication technologies (ICT) economic activities have become less dependent ...
WeiterlesenThis book constitutes the refereed proceedings of the Third International Workshop on Internet and Network Economics, WINE ...
WeiterlesenWINE 2005, the First Workshop on Internet and Network Economics (WINE 2005), took place in Hong Kong, China, December 15-17, ...
WeiterlesenThis book constitutes the refereed proceedings of the Second International Workshop on Internet and Network Economics, WINE ...
WeiterlesenThis book constitutes the refereed proceedings of the 4th International Workshop on Internet and Network Economics, WINE ...
WeiterlesenThis book constitutes the refereed proceedings of the 16th International Conference on Knowledge Engineering and Knowledge ...
WeiterlesenThe scope of the series includes: foundations of computer science; software theory and practice; education; computer applications ...
WeiterlesenThe emergence of the Internet of Things (IoT), combined with greater heterogeneity not only online in cloud computing architectures ...
WeiterlesenManaging in the Information Economy: Current Research Issues presents the recent research directions that address the issue ...
WeiterlesenThis book provides a broad range of insights on market engineering and information management. It covers topics like auctions, ...
WeiterlesenYou will learn: The three stages of customer relationships. How to create and implement the one marketing plan you will never ...
WeiterlesenThe importance of demonstrating the value achieved from IT investments is long established in the Computer Science (CS) and ...
WeiterlesenPresenting four complementary experimental studies targeting recurrent grey-zone scenarios on the Danish food market, the ...
WeiterlesenThis book contains the proceedings of the second IFIP TC8 Working Conference on Mobile Information Systems which was held ...
WeiterlesenIn this book, Jos de Bruijn and his coauthors lay the foundations for understanding the requirements that shape the description ...
WeiterlesenThe use of social media as a business tool is dominated by falsehoods, fictions and fabrications. In Myths of Social Media, ...
Weiterlesen