This book is a general reference designed for individuals from a broad range of professional backgrounds at various stages ...
Continue readingThis book covers Multilingual Textual Document Retrieval, Domain-Specifig Information Retrieval, i-CLEF, QA@CLEF, ImageCLEF, ...
Continue readingThis book covers Multilingual Textual Document Retrieval, Domain-Specifig Information Retrieval, i-CLEF, QA@CLEF, ImageCLEF, ...
Continue readingIn recent years, mobile applications and technologies have become valuable for many companies and their customers. This ongoing ...
Continue readingEvent-Triggered and Time-Triggered Control Paradigms presents a valuable survey about existing architectures for safety-critical ...
Continue readingThis open access book focuses on investigating predicting precursor information and key points of rockburst in mining engineering ...
Continue readingEvolving Connectionist Systems is aimed at all those interested in developing and using intelligent computational models ...
Continue readingEvolving Connectionist Systems is aimed at all those interested in developing and using intelligent computational models ...
Continue readingEnhances learning about complex project management principles and practices through the introduction and discussion of a ...
Continue readingPractical quantum computing still seems more than a decade away, and researchers have not even identified what the best physical ...
Continue readingThomas Kyte has a simple philosophy: You can treat Oracle as a black box and shove data inside of it, or you can learn how ...
Continue readingExploratory data analysis (EDA) is about detecting and describing patterns, trends, and relations in data, motivated by certain ...
Continue readingThis book provides an ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions ...
Continue readingThis book provides an ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions ...
Continue readingThe impact of social networks and the influence that fashion influencers have on the choices people make for shopping is ...
Continue readingConstitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...
Continue readingIncludes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
Continue readingThe scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue readingThe scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue readingThe focus of this book is on filtering for linear processes, and its primary goal is to design filters from a class of linear ...
Continue reading