This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...
Continue reading
                “Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
Continue reading
                The book covers not only practical aspects but also the underlying theoretical approaches. It also covers the fundamentals ...
Continue readingFabian Pfaffenberger evaluates the scientific usefulness of Twitter by considering several common survey and analysis methods. ...
Continue reading
                This book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...
Continue reading
                The book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
Continue reading
                Uranium is an element to be found ubiquitous in rock, soil, and water. Uranium concentrations in natural ground water can ...
Continue reading
                Subject of the book is Uranium and its migration in aquatic environments. The following subjects are emphasised: Uranium ...
Continue reading
                These papers address the latest research and development efforts and highlight the human aspects of design and use of computing ...
Continue reading
                The book offers topical sections on adaptive hypermedia, affective computing, data mining for personalization and cross-recommendation, ...
Continue reading
                This book constitutes the refereed proceedings of the 11th International Conference on User Modeling, UM 2007, held in Corfu, ...
Continue reading
                Tthis volume are organized in topical sections on data acquisition and modelling, visualization methods / audio, sensors ...
Continue reading
                Presents case studies that emphasize reliability and validity in different examples of qualitative, quantitative and mixed ...
Continue reading
                This book is organized in topical sections on static and dynamic processing of faces, facial expressions and gaze as well ...
Continue reading
                The volume is structured in three parts on theory and methodologies, techniques, and tools and applications.
Continue reading
                This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Continue reading
                This book addresses the processes related to mine abandonment from a hydrogeological perspective. The book gives some key ...
Continue reading
                Web community, defined as a set of Web-based documents with its own logical structure, is a flexible and efficient approach ...
Continue reading
                Web mining aims to discover u- ful information or knowledge from Web hyperlinks, page contents, and - age logs. Based on ...
Continue reading
                This book constitutes the proceedings of the 7th International Conference on Web Information Systems Engineering, WISE 2006, ...
Continue reading