This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...
Lire la suite“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
Lire la suiteThe book covers not only practical aspects but also the underlying theoretical approaches. It also covers the fundamentals ...
Lire la suiteFabian Pfaffenberger evaluates the scientific usefulness of Twitter by considering several common survey and analysis methods. ...
Lire la suiteThis book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...
Lire la suiteThe book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
Lire la suiteUranium is an element to be found ubiquitous in rock, soil, and water. Uranium concentrations in natural ground water can ...
Lire la suiteSubject of the book is Uranium and its migration in aquatic environments. The following subjects are emphasised: Uranium ...
Lire la suiteThese papers address the latest research and development efforts and highlight the human aspects of design and use of computing ...
Lire la suiteThe book offers topical sections on adaptive hypermedia, affective computing, data mining for personalization and cross-recommendation, ...
Lire la suiteThis book constitutes the refereed proceedings of the 11th International Conference on User Modeling, UM 2007, held in Corfu, ...
Lire la suiteTthis volume are organized in topical sections on data acquisition and modelling, visualization methods / audio, sensors ...
Lire la suitePresents case studies that emphasize reliability and validity in different examples of qualitative, quantitative and mixed ...
Lire la suiteThis book is organized in topical sections on static and dynamic processing of faces, facial expressions and gaze as well ...
Lire la suiteThe volume is structured in three parts on theory and methodologies, techniques, and tools and applications.
Lire la suiteThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Lire la suiteThis book addresses the processes related to mine abandonment from a hydrogeological perspective. The book gives some key ...
Lire la suiteWeb community, defined as a set of Web-based documents with its own logical structure, is a flexible and efficient approach ...
Lire la suiteWeb mining aims to discover u- ful information or knowledge from Web hyperlinks, page contents, and - age logs. Based on ...
Lire la suiteThis book constitutes the proceedings of the 7th International Conference on Web Information Systems Engineering, WISE 2006, ...
Lire la suite