Constitutes a valuable manual for young and seasoned business researchers alike, and provides a comprehensive summary for ...
Continue readingThis book constitutes the thoroughly refereed post-workshop proceedings of the First International Workshop on Motion in ...
Continue readingMoving Wearables into the Mainstream also introduces concepts such as Operational Inertia that form a mindset conducive to ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Multi-Agent-Based Simulation, ...
Continue readingProvides an insight about various techniques used in multimedia security and identifies its progress in both technological ...
Continue readingMultimodal Processing and Interaction: Audio, Video and Text presents high quality, state-of-the-art research ideas and results ...
Continue readingThe 82 revised full papers were carefully reviewed and selected from numerous submissions for inclusion in the book. The ...
Continue readingNLP techniques may substantially enhance most phases of the information system lifecycle, starting with requirement analysis, ...
Continue readingThis book constitutes the refereed proceedings of the 11th International Conference on Applications of Natural Language to ...
Continue readingThis book contains a selection of papers presented at the International Seminar "Negotiation and Market Engineering", held ...
Continue readingProvides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s ...
Continue readingThis book constitutes the refereed proceedings of the First International Conference on Network-Based Information Systems, ...
Continue readingThis book constitutes the refereed proceedings of the Second International Conference on Network-Based Information Systems, ...
Continue readingThe book begins with a quick introduction to RFID basics and then discusses the various elements of the topic, using applications ...
Continue readingThis book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
Continue readingThe 228 revised full papers presented were carefully reviewed and selected from numerous ordinary paper submissions and 15 ...
Continue readingThe 228 revised full papers presented were carefully reviewed and selected from numerous ordinary paper submissions and 15 ...
Continue readingThe technology of artifcial intelligence is increasing its importance thanks to the rapid growth of the Internet and computer ...
Continue readingThe book is structured in four parts: Part I “The Big Data Opportunity” explores the value potential of big data with ...
Continue readingThis book constitutes thoroughly refereed short papers of the 24th European Conference on Advances in Databases and Information ...
Continue reading