Dear delegates,friendsand membersofthe growingKES professionalcommunity,w- come to the proceedings of the 9th International ...
Lire la suiteDelegates and friends, we are very pleased to extend to you the sincerest of welcomes to this, the 10th International Conference ...
Lire la suiteDelegates and friends, we are very pleased to extend to you the sincerest of welcomes to this, the 10th International Conference ...
Lire la suiteThe papers present a wealth of original research results from the field of intelligent information processing in the broadest ...
Lire la suiteth This volume presents the proceedings of the 17 IFIP/IEEE International Workshop on Distributed Systems: Operations and ...
Lire la suiteThe scope of the series includes: foundations of computer science; software theory and practice; education; computer applications ...
Lire la suiteThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lire la suiteIn recent years the question of the legitimacy of international law has been discussed quite intensively. Such questions ...
Lire la suiteAdresses four standard business school subjects: microeconomics, macroeconomics, finance and information systems as they ...
Lire la suiteThese proceedings contain the papers presented at the 3rd International S- posium on Location- and Context-Awareness in September ...
Lire la suiteThis book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, ...
Lire la suiteThis book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being ...
Lire la suitecovers new methods, surveys, case studies, and policy with almost all machine learning techniques and analytics for cloud ...
Lire la suiteThis book presents research conducted in academia and industry on methods and applications of machine learning and data mining ...
Lire la suiteThis book constitutes the refereed proceedings of the 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain ...
Lire la suiteDescribes traditional as well as advanced machine learning algorithms Enables students to learn which algorithm is most appropriate ...
Lire la suiteThe cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...
Lire la suiteThis three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Lire la suiteThis three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Lire la suiteThis two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
Lire la suite