Electronic Books

Total Books: 1061 - 1080 /1272
Rule-Based Evolutionary Online Learning Systems

This book offers a comprehensive introduction to learning classifier systems (LCS) – or more generally, rule-based evolutionary ...

Weiterlesen
Rules and Rule Markup Languages for the Semantic Web

RuleML 2005 also accommodated the ?rst Workshop on OWL: Experiences and Directions. Rules are widely recognized to be a major ...

Weiterlesen
SOFSEM 2006: Theory and Practice of Computer Science

This book presents the proceedings of the 32nd Conference on Current Trends in Theory and Practice of Computer Science, held ...

Weiterlesen
SOFSEM 2007: Theory and Practice of Computer Science

This volume contains the invited and the contributed papers selected for presentation at SOFSEM 2007, the 33rd Conference ...

Weiterlesen
SOFSEM 2008: Theory and Practice of Computer Science : 34th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 19-25, 2008. Proceedings

This book is segmented into four topical sections on foundations of computer science; computing by nature; networks, security, ...

Weiterlesen
SQL Server 2000 Fast Answers for DBAs and Developers

SQL Server 2000 is the leading relational database for the Windows platform. It's a full-featured, enterprise-class database ...

Weiterlesen
SQL Server 2008 Transact-SQL Recipes

SQL Server 2008 Transact–SQL Recipes: A Problem–Solution Approach is an example–based guide to the Transact–SQL language ...

Weiterlesen
Samii's Essentials in Neurosurgery

Samii's Essentials in Neurosurgery' contains selected papers written by internationally recognized contributors who were ...

Weiterlesen
Satellite Earth Observations and Their Impact on Society and Policy

The result of a workshop bringing together an international advisory board of experts in science, satellite technologies, ...

Weiterlesen
Satellite Events at the MoDELS 2005 Conference

This book constitutes the thoroughly refereed post-proceedings of 10 internationl workshops held as satellite events of the ...

Weiterlesen
Scalable Uncertainty Management : Second International Conference, SUM 2008, Naples, Italy, October 1-3, 2008. Proceedings

The book address artificial intelligence researchers, database researchers, and practitioners to demonstrate theoretical ...

Weiterlesen
Scientific and Statistical Database Management : 20th International Conference, SSDBM 2008, Hong Kong, China, July 9-11, 2008 Proceedings

This book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...

Weiterlesen
Secure Data Management

Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...

Weiterlesen
Secure Data Management (vol. # 4165)

the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...

Weiterlesen
Secure Data Management : 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings

This book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...

Weiterlesen
Secure Data Management in Decentralized Systems

New data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...

Weiterlesen
Secure Transaction Protocol Analysis : Models and Applications

The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...

Weiterlesen
Secure and Smart Internet of Things (IoT) Using Blockchain and AI / Ahmed Banafa

Up to 28 billion devices will be connected to the Internet with only one third of them being computers, smartphones and tablets. ...

Weiterlesen
Security in IoT : The Changing Perspective / Rituparna Chaki, Debdutta Barman Roy

It will be beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme ...

Weiterlesen
Security with Noisy Data

Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...

Weiterlesen
Total Books: 1061 - 1080 /1272