This book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism ...
Lee mas
Constitutes the refereed proceedings of the 6th International Conference on Intelligent Data Engineering and Automated Learning, ...
Lee mas
Web personalizationcan be de?ned as any set of actions that can tailor the Web experience to a particular user or set of ...
Lee masTechnology has been found to facilitate humankind's life. Hence, there is a new technique almost every day. One of the most ...
Lee mas
As a result of the progress in information and communication technologies (ICT) economic activities have become less dependent ...
Lee mas
This book constitutes the refereed proceedings of the Third International Workshop on Internet and Network Economics, WINE ...
Lee mas
WINE 2005, the First Workshop on Internet and Network Economics (WINE 2005), took place in Hong Kong, China, December 15-17, ...
Lee mas
This book constitutes the refereed proceedings of the Second International Workshop on Internet and Network Economics, WINE ...
Lee mas
This book constitutes the refereed proceedings of the 4th International Workshop on Internet and Network Economics, WINE ...
Lee mas
This book constitutes the refereed proceedings of the 16th International Conference on Knowledge Engineering and Knowledge ...
Lee mas
The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications ...
Lee mas
The emergence of the Internet of Things (IoT), combined with greater heterogeneity not only online in cloud computing architectures ...
Lee mas
Managing in the Information Economy: Current Research Issues presents the recent research directions that address the issue ...
Lee masThis book provides a broad range of insights on market engineering and information management. It covers topics like auctions, ...
Lee mas
You will learn: The three stages of customer relationships. How to create and implement the one marketing plan you will never ...
Lee mas
The importance of demonstrating the value achieved from IT investments is long established in the Computer Science (CS) and ...
Lee mas
Presenting four complementary experimental studies targeting recurrent grey-zone scenarios on the Danish food market, the ...
Lee mas
This book contains the proceedings of the second IFIP TC8 Working Conference on Mobile Information Systems which was held ...
Lee mas
In this book, Jos de Bruijn and his coauthors lay the foundations for understanding the requirements that shape the description ...
Lee masThe use of social media as a business tool is dominated by falsehoods, fictions and fabrications. In Myths of Social Media, ...
Lee mas