This book constitutes the refereed proceedings of the Third International Workshop on Mining Complex Data, MCD 2007, held ...
Lire la suiteMultimodal Processing and Interaction: Audio, Video and Text presents high quality, state-of-the-art research ideas and results ...
Lire la suiteThis volume contains the papers presented at NLDB 2008, the 13th Inter- tional Conference on Natural Language and Information ...
Lire la suiteThe technology of artifcial intelligence is increasing its importance thanks to the rapid growth of the Internet and computer ...
Lire la suiteThe book is structured in four parts: Part I “The Big Data Opportunity” explores the value potential of big data with ...
Lire la suiteThis two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences ...
Lire la suiteThis book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...
Lire la suiteThis book constitutes the refereed proceedings of the 7th International Conference on Practical Aspects of Knowledge Management, ...
Lire la suiteConstitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
Lire la suiteConstitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2008, held ...
Lire la suitePrivacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...
Lire la suiteThis book is organized in topical sections on data mining and knowledge discovery, wireless, sensor networks and grid, XML ...
Lire la suiteThis book is organized in topical sections on provenance: models and querying; provenance: visualization, failures, identity; ...
Lire la suiteThis book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Lire la suitePoor data quality can hinder or seriously damage the efficiency and effectiveness of organizations and businesses. The growing ...
Lire la suiteThis book is presented provide competent coverage of methods and major application areas such as social networks, semantic ...
Lire la suiteThe book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
Lire la suiteThis book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...
Lire la suiteThis book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
Lire la suiteThe present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
Lire la suite