This volume of the TRS presents papers that reflect the profound influence of a number of research initiatives by Zdzislaw ...
Continue readingThis volume of TRS presents papers that introduce a number of new - vances in the foundations and applications of arti?cial ...
Continue readingThis book examines the kinds of transitions that have been studied in mathematics education research. It defines transition ...
Continue reading“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
Continue readingThe book contains methodology, causation, and reduction, and include philosophy of logic and physics, philosophy of psychology ...
Continue readingThis book is about Rational Agents, which can be humans, players in a game, software programs or institutions. Typically, ...
Continue readingThis summons clearly resonates with the “archetypical image” associated with water as a basic element, discussed in Chapter ...
Continue readingAction planning has always played a central role in Artificial Intelligence. Given a description of the current situation, ...
Continue readingThis book examines social constructionism as a metatheory of psychology. It does not consider constructionist accounts of ...
Continue readingThese papers address the latest research and development efforts and highlight the human aspects of design and use of computing ...
Continue readingVBSE extends the merely technical ISO software engineering definition with elements not only from economics, but also from ...
Continue readingLinks the formal theory of word vectors to the cognitive theory of linguistics. The computational linguists and deep learning ...
Continue readingThis book represents a contribution to the consolidation of the already vast amount of empirical knowledge and practical ...
Continue readingVirtual Heritage, Applied Technologies and Virtual Environments. With a truly international flavor, these sub-themes covered ...
Continue readingThis volume challenges the view that women have not contributed to the historical development of political ideas, and highlights ...
Continue readingThe volume is structured in three parts on theory and methodologies, techniques, and tools and applications.
Continue readingCombines visual inputs like image and video with a natural language question concerning the input and generates a natural ...
Continue readingThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Continue readingThis book is organized in topical sections on grid computing and peer-to-peer systems; Web mining; rich Web user interfaces; ...
Continue readingThe First International Workshop on Web Information Systems Engineering for Electronic Businesses and Governments (E-BAG ...
Continue reading