This book explains and explores the principal techniques of Data Mining: for classification, generation of association rules ...
Lee masThis book constitutes the refereed proceedings of the 11th International Conference on Principles of Distributed Systems, ...
Lee masA collection of papers organized in topical sections on design of distributed systems, ad-hoc networks and mobile agents, ...
Lee masThis book constitutes the refereed post-proceedings of the 9th International Conference on Principles of Distributed Systems, ...
Lee masThis book constitutes the refereed proceedings of the 10th International Conference on Principles of Distributed Systems, ...
Lee masThe 30 full papers and 11 short papers presented were carefully reviewed and selected from 102 submissions. The conference ...
Lee masPrinciples of Hyperplasticity is concerned with the theoretical modelling of the behaviour of solids which undergo nonlinear ...
Lee masEmphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview ...
Lee masFeatures new content on 4G cellular systems, 5G cellular outlook, bandpass signals and systems, and polarization, among many ...
Lee masIntroduces the reader to the principles used in the construction of a large range of modern data communication protocols. ...
Lee masThis book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...
Lee masThis volume contains the papers presented at POST 2018, the 7th Conference on Principles of Security and Trust, held April ...
Lee masPrinciples of Spin is an introductory book for students and practicing software engineers who wish to learn Promela and Spin. ...
Lee masThis book constitutes the thoroughly refereed proceedings of the 10th International Workshop on Principles, Systems and Applications ...
Lee masThis book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...
Lee masTraditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either ...
Lee masThe papers in this volume represent the proceedings of the 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June ...
Lee masThe papers in this volume represent the proceedings of The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was ...
Lee masConstitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
Lee masData mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns ...
Lee mas