This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
Continue readingThis book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
Continue readingThis volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...
Continue readingThis book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...
Continue readingThis book is a step-by-step introduction on how shell scripting can help solve many of the data processing tasks that Health ...
Continue readingData-Driven 3D Facial Animation: systematically describes the emerging data-driven techniques developed over the last ten ...
Continue readingData-Driven 3D Facial Animation: systematically describes the emerging data-driven techniques developed over the last ten ...
Continue readingThis book provides statistical tools for evaluating the effects of public policies advocated by governments and public institutions. ...
Continue readingConceptualises the scale and spectrum of Building Information Modelling (BIM) and Artificial Intelligence (AI) approaches ...
Continue readingThis volume contains works at the intersection of database and programming language research.It also cover algorithms, XML ...
Continue readingConstitutes the refereed post-proceedings of the 10th International Workshop on Database Programming Languages, DBPL 2005. ...
Continue readingThe papers here are organized in topical sections on semistructured data OL AP and data mining systems, schema integration, ...
Continue readingThis volume contains works at the intersection of database and programming language research.It also cover algorithms, XML ...
Continue readingThe Ninth International Workshop on Foundations of Models and Languages for Data and Objects (FoMLaDO) took place in Dagstuhl ...
Continue readingData Stream Mining and Resource Adaptive Computation.- Purpose Based Access Control for Privacy Protection in Database Systems.- ...
Continue readingThis book constitutes the refereed proceedings of the 11th International Conference on Database Systems for Advanced Applications, ...
Continue readingThis book constitutes the refereed proceedings of the 13th International Conference on Database Systems for Advanced Applications, ...
Continue readingThis volume collects the papers presented at the 10th International Conference on Database Theory, ICDT 2005, held during ...
Continue readingThe papers are organized in topical sections on information integration and peer to peer, axiomatizations for XML, expressive ...
Continue readingThis volume represent the state of the art of - search in the domain of data, information and knowledge management, intelligent ...
Continue reading