This volume constitutes the refereed proceedings of the 5th International Workshop on Grid Economics and Business Models, ...
Lee masThis book aims to strengthen and advance scientific and technological excellence in the area of Grid Computing. The main ...
Lee masThis volume presents the accepted papers for the 4th International Conference on Grid and Cooperative Computing (GCC2005),held ...
Lee masThis volume constitutes the proceedings of the 13th International Workshop on Groupware (CRIWG 2007). This workshop aims ...
Lee masTopical sections include collaborative applications and group interaction, group awareness, computer supported collaborative ...
Lee masThis book constitutes the refereed post-conference proceedings of the 14th International Workshop on Groupware: Design, Implementation, ...
Lee masThis stimulating text/reference presents a philosophical exploration of the conceptual foundations of deep learning, presenting ...
Lee masThe present book contains a collection of the best papers presented at the 5th International Conference on Interacción Persona ...
Lee masBig Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, ...
Lee masBig Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, ...
Lee masThis Handbook presents a comprehensive and rigorous overview of the state-of-the-art on Smart Cities. It provides the reader ...
Lee masDecision support systems have experienced a marked increase in attention and importance over the past 25 years. The aim of ...
Lee masBegins with an overview of the technology landscape behind BERT. It takes you through the basics of NLP, including natural ...
Lee masThis book constitutes the proceedings of the 12th International Conference on Human Haptic Sensing and Touch Enabled Computer ...
Lee mas“Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies ...
Lee masHardening is the process of protecting a system against unknown threats. System administrators harden against that which ...
Lee masHierarchical matrices are an efficient framework for large-scale fully populated matrices arising, e.g., from the finite ...
Lee masThis book constitutes the refereed proceedings of the 10th International Conference on Software Reuse, ICSR 2008, held in ...
Lee masThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lee masThe objective of this symposium is to exchange the latest research results in software, architecture, and applications in ...
Lee mas