This volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 19th IFIP/IEEE ...
Lee masThis book constitutes the refereed proceedings of the Third International Workshop on Mining Complex Data, MCD 2007, held ...
Lee masMultimodal Processing and Interaction: Audio, Video and Text presents high quality, state-of-the-art research ideas and results ...
Lee masThis volume contains the papers presented at NLDB 2008, the 13th Inter- tional Conference on Natural Language and Information ...
Lee masThe technology of artifcial intelligence is increasing its importance thanks to the rapid growth of the Internet and computer ...
Lee masThe book is structured in four parts: Part I “The Big Data Opportunity” explores the value potential of big data with ...
Lee masThis two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences ...
Lee masThis book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...
Lee masThis book constitutes the refereed proceedings of the 7th International Conference on Practical Aspects of Knowledge Management, ...
Lee masConstitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
Lee masConstitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2008, held ...
Lee masPrivacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...
Lee masThis book is organized in topical sections on data mining and knowledge discovery, wireless, sensor networks and grid, XML ...
Lee masThis book is organized in topical sections on provenance: models and querying; provenance: visualization, failures, identity; ...
Lee masThis book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Lee masPoor data quality can hinder or seriously damage the efficiency and effectiveness of organizations and businesses. The growing ...
Lee masThis book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...
Lee masThe book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
Lee masThis book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...
Lee masThis book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
Lee mas