This book explains and explores the principal techniques of Data Mining: for classification, generation of association rules ...
Continue readingThis book constitutes the refereed proceedings of the 11th International Conference on Principles of Distributed Systems, ...
Continue readingA collection of papers organized in topical sections on design of distributed systems, ad-hoc networks and mobile agents, ...
Continue readingThis book constitutes the refereed post-proceedings of the 9th International Conference on Principles of Distributed Systems, ...
Continue readingThis book constitutes the refereed proceedings of the 10th International Conference on Principles of Distributed Systems, ...
Continue readingThe 30 full papers and 11 short papers presented were carefully reviewed and selected from 102 submissions. The conference ...
Continue readingPrinciples of Hyperplasticity is concerned with the theoretical modelling of the behaviour of solids which undergo nonlinear ...
Continue readingEmphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview ...
Continue readingFeatures new content on 4G cellular systems, 5G cellular outlook, bandpass signals and systems, and polarization, among many ...
Continue readingIntroduces the reader to the principles used in the construction of a large range of modern data communication protocols. ...
Continue readingThis book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...
Continue readingThis volume contains the papers presented at POST 2018, the 7th Conference on Principles of Security and Trust, held April ...
Continue readingPrinciples of Spin is an introductory book for students and practicing software engineers who wish to learn Promela and Spin. ...
Continue readingThis book constitutes the thoroughly refereed proceedings of the 10th International Workshop on Principles, Systems and Applications ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...
Continue readingTraditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either ...
Continue readingThe papers in this volume represent the proceedings of the 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June ...
Continue readingThe papers in this volume represent the proceedings of The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was ...
Continue readingConstitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
Continue readingData mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns ...
Continue reading