While most of the current works in Artificial Intelligence (AI) focus on individual aspects of intelligence and cognition, ...
Lire la suite
Offers a fresh method of assessing and managing risks in SMEs, by adopting a multidisciplinary approach. In small and medium ...
Lire la suite
This book covers methods based on a combination of granular computing, rough sets, and knowledge discovery in data mining ...
Lire la suite
This book is organized in topical sections on logical and mathematical foundations, data analysis, data mining, decision ...
Lire la suite
Constitutes proceedings of the Second International Conference on Rough Sets and Knowledge Technology, RSKT 2007, held in ...
Lire la suite
This volume contains the papers selected for presentation at the First Int- national Conference on Rough Sets and Knowledge ...
Lire la suite
This book focus on five major research fields: computing theory and paradigms, knowledge technology, intelligent information ...
Lire la suite
This book provides an overview of the field and introduces a number of different approaches to extracting rules from support ...
Lire la suite
This book is organized in topical sections on rule engineering, rule-based methodologies and applications in policies, electronic ...
Lire la suite
This book presents the proceedings of the 32nd Conference on Current Trends in Theory and Practice of Computer Science, held ...
Lire la suite
This book is segmented into four topical sections on foundations of computer science; computing by nature; networks, security, ...
Lire la suite
This book is organized in topical sections on applied topic maps in industry and administration, visualisation and representation ...
Lire la suite
special emphasis was given to lessons for future thinking about the contribution of agriculture to: 1) poverty alleviation ...
Lire la suite
This book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...
Lire la suite
This volume offers a critical examination of the growing pressure to apply scientific principles as a means to improve education. ...
Lire la suiteThis book trains the next generation of scientists representing different disciplines to leverage the data generated during ...
Lire la suite
The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...
Lire la suite
The main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- ...
Lire la suite
This was the era of the ?rst university calculation centres that one accessed over a counter. One would deposit cards on ...
Lire la suite
This book is organized in topical sections on peer-to-peer systems, overlay networks as well as resource and service management.
Lire la suite