The book is organized in topical sections on agents, application ontologies, applications, formal languages, foundational ...
Lee masThis volume is a collection of my essays on Gustav von Schmoller (1838– 1917), Max Weber (1864–1920), and Joseph Alois ...
Lee masClassifying objects into categories at different granularity levels, establishing links between known objects, and discovering ...
Lee masThis book concisely brings together the key standards and best practices relating to modelling, querying, validating and ...
Lee masThe LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...
Lee masThis volume includes adaption/monitoring, model driven architecture, network services, service oriented architecture, business ...
Lee masThe LNCS journal Transactions on Rough Sets is devoted to the entire spectrum of rough sets related issues, from logical ...
Lee masTransformations and projections are used extensively in Computer Graphics, a field which is now a part of everyone’s lives ...
Lee masThis book constitutes the thoroughly refereed postproceedings of the International Workshop on Trends in Enterprise Application ...
Lee mas“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
Lee masThe book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...
Lee masFabian Pfaffenberger evaluates the scientific usefulness of Twitter by considering several common survey and analysis methods. ...
Lee masOver recent years most business processes have changed in various dimensions (e. g. , ?exibility, interconnectivity, coordination ...
Lee masThe present volume represents the first comprehensive compilation of state-of-the-art research approaches to uncertainty ...
Lee masA practical, no-nonsense guide to digital marketing, giving readers all the information they need to feel confident engaging ...
Lee masThis book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
Lee masThis book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...
Lee masThe book offers topical sections on adaptive hypermedia, affective computing, data mining for personalization and cross-recommendation, ...
Lee masThe first great graphics technology for the Web,VRML,has been mistaken for something else since its inception. Viewed variously ...
Lee masThis pioneering book deals specifically with the visualization of the Second-Generation Web. Now in its second edition it ...
Lee mas