This volume of the TRS presents papers that reflect the profound influence of a number of research initiatives by Zdzislaw ...
Continue reading
This volume of TRS presents papers that introduce a number of new - vances in the foundations and applications of arti?cial ...
Continue readingThis book examines the kinds of transitions that have been studied in mathematics education research. It defines transition ...
Continue reading
“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
Continue reading
The book contains methodology, causation, and reduction, and include philosophy of logic and physics, philosophy of psychology ...
Continue reading
This book is about Rational Agents, which can be humans, players in a game, software programs or institutions. Typically, ...
Continue reading
This summons clearly resonates with the “archetypical image” associated with water as a basic element, discussed in Chapter ...
Continue reading
Action planning has always played a central role in Artificial Intelligence. Given a description of the current situation, ...
Continue reading
This book examines social constructionism as a metatheory of psychology. It does not consider constructionist accounts of ...
Continue reading
These papers address the latest research and development efforts and highlight the human aspects of design and use of computing ...
Continue reading
VBSE extends the merely technical ISO software engineering definition with elements not only from economics, but also from ...
Continue reading
Links the formal theory of word vectors to the cognitive theory of linguistics. The computational linguists and deep learning ...
Continue reading
This book represents a contribution to the consolidation of the already vast amount of empirical knowledge and practical ...
Continue reading
Virtual Heritage, Applied Technologies and Virtual Environments. With a truly international flavor, these sub-themes covered ...
Continue reading
This volume challenges the view that women have not contributed to the historical development of political ideas, and highlights ...
Continue reading
The volume is structured in three parts on theory and methodologies, techniques, and tools and applications.
Continue reading
Combines visual inputs like image and video with a natural language question concerning the input and generates a natural ...
Continue reading
This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Continue reading
This book is organized in topical sections on grid computing and peer-to-peer systems; Web mining; rich Web user interfaces; ...
Continue reading
The First International Workshop on Web Information Systems Engineering for Electronic Businesses and Governments (E-BAG ...
Continue reading