This volume collects the papers presented at the 10th International Conference on Database Theory, ICDT 2005, held during ...
Lee mas
The papers are organized in topical sections on information integration and peer to peer, axiomatizations for XML, expressive ...
Lee mas
DEXA 2005, the 16th International Conference on Database and Expert Systems Applications, was held at the Copenhagen Business ...
Lee mas
The double volumes LNCS 12391-12392 constitutes the papers of the 31st International Conference on Database and Expert Systems ...
Lee mas
This book constitutes the refereed proceedings of the 19th International Conference on Database and Expert Systems Applications, ...
Lee mas
Constitutes the proceedings of the Third International XML Database Symposium, XSym 2005, held in Trondheim, Norway in August ...
Lee mas
The British National Conference on Databases (BNCOD) was established in 1980 as a forum for research into the theory and ...
Lee mas
This book constitutes the refereed proceedings of the 14th International Baltic Conference on Databases and Information Systems, ...
Lee mas
This book Is focusing on data semantics and infrastructure for information management and interchange, the papers are organized ...
Lee mas
This book constitutes the refereed proceedings of the 4th International Workshop on Databases in Networked Information Systems, ...
Lee mas
This book Is focusing on data semantics and infrastructure for information management and interchange, the papers are organized ...
Lee mas
The P2P paradigm lends itself to constructing large-scale, complex, adaptive, autonomous and heterogeneous database and information ...
Lee mas
Peer-to-peer (P2P) computing promises to o?er exciting new possibilities in d- tributed information processing and database ...
Lee mas
The P2P paradigm lends itself to constructing large-scale, complex, adaptive, autonomous and heterogeneous database and information ...
Lee mas
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Lee mas
Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Lee mas
The benefits of reading this book are twofold. The first is an understanding of the stages of a new product development process ...
Lee mas
Topics and features: Presents a curiosity-driven approach, posing questions to stimulate readers to design novel computational ...
Lee mas
In this book defense and security related applications are increasingly being tackled by researchers and practioners using ...
Lee mas
This is the third volume of the new conference series Design Computing and Cognition (DCC) that takes over from and subsumes ...
Lee mas