This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in computer ...
Continue readingThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue readingIntelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information ...
Continue readingIntelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...
Continue readingIntelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...
Continue readingIn the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development ...
Continue readingThis book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, ...
Continue readingThis book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, ...
Continue readingThis book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism ...
Continue readingThe rapid growth in electronic systems in the past decade has boosted research in the area of computational intelligence. ...
Continue readingThe rapid growth in electronic systems in the past decade has boosted research in the area of computational intelligence. ...
Continue readingWeb personalizationcan be de?ned as any set of actions that can tailor the Web experience to a particular user or set of ...
Continue readingincludes high-quality research on various aspects of intelligent interactive multimedia technologies in healthcare services. ...
Continue readingThis book cover a wide range of topics from a technology to a business perspective and include among others hardware, software ...
Continue readingOn behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...
Continue readingLEGAL PROGRAMMING: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond provides ...
Continue readingThese proceedings contain the papers presented at the 3rd International S- posium on Location- and Context-Awareness in September ...
Continue readingnd These proceedings contain the papers presented at the 2 International Workshop on Location- and Context-Awareness in May ...
Continue readingThis three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Continue readingThe book deals with the management of information systems security and privacy, based on a model that covers technological, ...
Continue reading