This book constitutes the refereed proceedings of the 11th International Conference on Applications of Natural Language to ...
Continue readingThis book constitutes the thoroughly refereed post-proceedings of the First International Joint Conference on Natural Language ...
Continue readingThis volume contains the papers presented at NLDB 2008, the 13th Inter- tional Conference on Natural Language and Information ...
Continue readingPresents a range of methods, strategies, and viewpoints on digital communication and offers an in-depth analysis of the wide ...
Continue readingThis book contains a selection of papers presented at the International Seminar "Negotiation and Market Engineering", held ...
Continue readingThis volume introduces the technical issues surrounding security, as well as how security policies are formulated at the ...
Continue readingProvides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s ...
Continue readingThis book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC ...
Continue readingNetwork-Aware Security for Group Communications fills a growing need in the research community for a reference that describes ...
Continue readingThis book constitutes the refereed proceedings of the First International Conference on Network-Based Information Systems, ...
Continue readingThis book constitutes the refereed proceedings of the Second International Conference on Network-Based Information Systems, ...
Continue readingNetwork-Centric Service-Oriented Enterprise (NSCOE) is seen as heralding the next generation of mainstream Enterprise-business ...
Continue readingNetworked Control Systems presents the most recent results in stability and robustness analysis as well as new developments ...
Continue readingThe book begins with a quick introduction to RFID basics and then discusses the various elements of the topic, using applications ...
Continue readingThis book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...
Continue readingIn recent years, there has been significant interest and advances in developing systematic techniques to synthesize interactive ...
Continue readingThe concept of a network emerges as a powerful and stimulating research paradigm in mathematics, physics and computer science, ...
Continue readingThis book and its companion volumes constitute the Proceedings of the 13th - ternationalConferenceonNeuralInformationProcessing(ICONIP2006)heldin ...
Continue readingThe three volume set LNCS 4232, LNCS 4233, and LNCS 4234 constitutes the refereed proceedings of the 13th International Conference ...
Continue readingThis book and its companion volumes constitute the Proceedings of the 13th - ternationalConferenceonNeuralInformationProcessing(ICONIP2006)heldin ...
Continue reading