The aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal ...
Continue readingVast amounts of data are collected by service providers and system administ- tors, and are available in public information ...
Continue readingPrivacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...
Continue readingPro PerformancePoint Server 2007 is Microsoft's latest product in its line of business intelligence applications, a piece ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue readingComprises all the single courses given as part of the First Summer School on Process Mining, PMSS 2022, which was held in ...
Continue readingThis open access book constitutes revised selected papers from the International Workshops held at the Third International ...
Continue readingThe papers address different development modes, roles in the value chain, stakeholders’ viewpoints, collaborative development, ...
Continue readingThis book constitutes the proceedings of the 29th European Symposium on Programming, ESOP 2020, which took place in Dublin, ...
Continue readingThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Continue readingThis book is organized in topical sections on data mining and knowledge discovery, wireless, sensor networks and grid, XML ...
Continue readingThis book is organized in topical sections on provenance: models and querying; provenance: visualization, failures, identity; ...
Continue readingThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Continue readingThis book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Continue readingPoor data quality can hinder or seriously damage the efficiency and effectiveness of organizations and businesses. The growing ...
Continue readingMany decisions are required throughout the software development process. These decisions, and to some extent the decision-making ...
Continue readingThis book reports on a novel and comprehensive approach to the uptake of ICT in Schools. It focuses on key questions, pedagogically ...
Continue readingThis volume contains the tutorial papers of the Summer School “Reasoning Web,”July25–29,2005(http://reasoningweb. org). ...
Continue readingThis book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...
Continue readingThis book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Continue reading