This book constitutes the refereed proceedings of the Third International Workshop on Mining Complex Data, MCD 2007, held ...
Continue readingMultimodal Processing and Interaction: Audio, Video and Text presents high quality, state-of-the-art research ideas and results ...
Continue readingThis volume contains the papers presented at NLDB 2008, the 13th Inter- tional Conference on Natural Language and Information ...
Continue readingThe technology of artifcial intelligence is increasing its importance thanks to the rapid growth of the Internet and computer ...
Continue readingThe book is structured in four parts: Part I “The Big Data Opportunity” explores the value potential of big data with ...
Continue readingThis two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences ...
Continue readingThis book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...
Continue readingThis book constitutes the refereed proceedings of the 7th International Conference on Practical Aspects of Knowledge Management, ...
Continue readingConstitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
Continue readingConstitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2008, held ...
Continue readingPrivacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...
Continue readingThis book is organized in topical sections on data mining and knowledge discovery, wireless, sensor networks and grid, XML ...
Continue readingThis book is organized in topical sections on provenance: models and querying; provenance: visualization, failures, identity; ...
Continue readingThis book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Continue readingPoor data quality can hinder or seriously damage the efficiency and effectiveness of organizations and businesses. The growing ...
Continue readingThis book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...
Continue readingThe book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
Continue readingThis book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...
Continue readingThis book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
Continue readingThe present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
Continue reading