Electronic Books

Total Books: 1301 - 1320 /3928
Data Warehousing and Data Mining Techniques for Cyber Security

It provide techniques for collecting information from distributed databases and for performing data analysis. The ever expanding, ...

Lee mas
Data Warehousing and Knowledge Discovery

Data Warehousing and Knowledge Discovery have been widely accepted as key te- nologies for enterprises and organizations ...

Lee mas
Data Warehousing and Knowledge Discovery

Within the last few years Data Warehousing and Knowledge Discovery technology has established itself as a key technology ...

Lee mas
Data Warehousing and Knowledge Discovery

Data Warehousing and Knowledge Discovery have been widely accepted as key te- nologies for enterprises and organizations ...

Lee mas
Data Warehousing and Knowledge Discovery (vol. # 3589)

For more than a decade, data warehousing and knowledge discovery technologies have been developing into key technologies ...

Lee mas
Data Warehousing and Knowledge Discovery (vol. # 4081)

DaWaK aimed at providing the right and logical balance between data warehousing and knowledge discovery. In data warehousing ...

Lee mas
Data Warehousing and Knowledge Discovery : 10th International Conference, DaWaK 2008 Turin, Italy, September 2-5, 2008 Proceedings

This book constitutes the refereed proceedings of the 10th International Conference on Data Warehousing and Knowledge Discovery, ...

Lee mas
Data and Applications Security XIX

Constitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, ...

Lee mas
Data and Applications Security XX

For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting ...

Lee mas
Data and Applications Security XXI

This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...

Lee mas
Data and Applications Security XXI

This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...

Lee mas
Data and Applications Security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings

This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...

Lee mas
Data and Applications Security and Privacy XXXIV : 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings

This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...

Lee mas
Data-Driven 3D Facial Animation

Data-Driven 3D Facial Animation: systematically describes the emerging data-driven techniques developed over the last ten ...

Lee mas
Data-Driven 3D Facial Animation

Data-Driven 3D Facial Animation: systematically describes the emerging data-driven techniques developed over the last ten ...

Lee mas
Database Programming Languages

This volume contains works at the intersection of database and programming language research.It also cover algorithms, XML ...

Lee mas
Database Programming Languages

Constitutes the refereed post-proceedings of the 10th International Workshop on Database Programming Languages, DBPL 2005. ...

Lee mas
Database Programming Languages

The papers here are organized in topical sections on semistructured data OL AP and data mining systems, schema integration, ...

Lee mas
Database Programming Languages

This volume contains works at the intersection of database and programming language research.It also cover algorithms, XML ...

Lee mas
Database Schema Evolution and Meta-Modeling

The Ninth International Workshop on Foundations of Models and Languages for Data and Objects (FoMLaDO) took place in Dagstuhl ...

Lee mas
Total Books: 1301 - 1320 /3928