“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
Continue readingThe book contains methodology, causation, and reduction, and include philosophy of logic and physics, philosophy of psychology ...
Continue readingThis book is about Rational Agents, which can be humans, players in a game, software programs or institutions. Typically, ...
Continue readingThis summons clearly resonates with the “archetypical image” associated with water as a basic element, discussed in Chapter ...
Continue readingAction planning has always played a central role in Artificial Intelligence. Given a description of the current situation, ...
Continue readingThis book examines social constructionism as a metatheory of psychology. It does not consider constructionist accounts of ...
Continue readingThis textbook highlights the many practical uses of stable distributions, exploring the theory, numerical algorithms, and ...
Continue readingThese papers address the latest research and development efforts and highlight the human aspects of design and use of computing ...
Continue readingVBSE extends the merely technical ISO software engineering definition with elements not only from economics, but also from ...
Continue readingLinks the formal theory of word vectors to the cognitive theory of linguistics. The computational linguists and deep learning ...
Continue readingThis book represents a contribution to the consolidation of the already vast amount of empirical knowledge and practical ...
Continue readingVirtual Heritage, Applied Technologies and Virtual Environments. With a truly international flavor, these sub-themes covered ...
Continue readingThis volume challenges the view that women have not contributed to the historical development of political ideas, and highlights ...
Continue readingImage analysis is a computational feat which humans show excellence in, in comp- ison with computers. Yet the list of applications ...
Continue readingThe volume is structured in three parts on theory and methodologies, techniques, and tools and applications.
Continue readingCombines visual inputs like image and video with a natural language question concerning the input and generates a natural ...
Continue readingThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Continue readingThe core of the book discusses alternative technology platforms for pre-packaging wafer level 3-D ICs, with an emphasis on ...
Continue readingThis book is organized in topical sections on grid computing and peer-to-peer systems; Web mining; rich Web user interfaces; ...
Continue readingThe First International Workshop on Web Information Systems Engineering for Electronic Businesses and Governments (E-BAG ...
Continue reading