“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
Lee masThe book contains methodology, causation, and reduction, and include philosophy of logic and physics, philosophy of psychology ...
Lee masThis book is about Rational Agents, which can be humans, players in a game, software programs or institutions. Typically, ...
Lee masThis summons clearly resonates with the “archetypical image” associated with water as a basic element, discussed in Chapter ...
Lee masAction planning has always played a central role in Artificial Intelligence. Given a description of the current situation, ...
Lee masThis book examines social constructionism as a metatheory of psychology. It does not consider constructionist accounts of ...
Lee masThis textbook highlights the many practical uses of stable distributions, exploring the theory, numerical algorithms, and ...
Lee masThese papers address the latest research and development efforts and highlight the human aspects of design and use of computing ...
Lee masVBSE extends the merely technical ISO software engineering definition with elements not only from economics, but also from ...
Lee masLinks the formal theory of word vectors to the cognitive theory of linguistics. The computational linguists and deep learning ...
Lee masThis book represents a contribution to the consolidation of the already vast amount of empirical knowledge and practical ...
Lee masVirtual Heritage, Applied Technologies and Virtual Environments. With a truly international flavor, these sub-themes covered ...
Lee masThis volume challenges the view that women have not contributed to the historical development of political ideas, and highlights ...
Lee masImage analysis is a computational feat which humans show excellence in, in comp- ison with computers. Yet the list of applications ...
Lee masThe volume is structured in three parts on theory and methodologies, techniques, and tools and applications.
Lee masCombines visual inputs like image and video with a natural language question concerning the input and generates a natural ...
Lee masThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Lee masThe core of the book discusses alternative technology platforms for pre-packaging wafer level 3-D ICs, with an emphasis on ...
Lee masThis book is organized in topical sections on grid computing and peer-to-peer systems; Web mining; rich Web user interfaces; ...
Lee masThe First International Workshop on Web Information Systems Engineering for Electronic Businesses and Governments (E-BAG ...
Lee mas