This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...
Continue reading“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
Continue readingThe book covers not only practical aspects but also the underlying theoretical approaches. It also covers the fundamentals ...
Continue readingFabian Pfaffenberger evaluates the scientific usefulness of Twitter by considering several common survey and analysis methods. ...
Continue readingThis book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...
Continue readingThe book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
Continue readingUranium is an element to be found ubiquitous in rock, soil, and water. Uranium concentrations in natural ground water can ...
Continue readingSubject of the book is Uranium and its migration in aquatic environments. The following subjects are emphasised: Uranium ...
Continue readingThese papers address the latest research and development efforts and highlight the human aspects of design and use of computing ...
Continue readingThe book offers topical sections on adaptive hypermedia, affective computing, data mining for personalization and cross-recommendation, ...
Continue readingThis book constitutes the refereed proceedings of the 11th International Conference on User Modeling, UM 2007, held in Corfu, ...
Continue readingTthis volume are organized in topical sections on data acquisition and modelling, visualization methods / audio, sensors ...
Continue readingPresents case studies that emphasize reliability and validity in different examples of qualitative, quantitative and mixed ...
Continue readingThis book is organized in topical sections on static and dynamic processing of faces, facial expressions and gaze as well ...
Continue readingThe volume is structured in three parts on theory and methodologies, techniques, and tools and applications.
Continue readingThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Continue readingThis book addresses the processes related to mine abandonment from a hydrogeological perspective. The book gives some key ...
Continue readingWeb community, defined as a set of Web-based documents with its own logical structure, is a flexible and efficient approach ...
Continue readingWeb mining aims to discover u- ful information or knowledge from Web hyperlinks, page contents, and - age logs. Based on ...
Continue readingThis book constitutes the proceedings of the 7th International Conference on Web Information Systems Engineering, WISE 2006, ...
Continue reading