This volume constitutes the refereed proceedings of the 5th International Workshop on Grid Economics and Business Models, ...
Lire la suiteThis book aims to strengthen and advance scientific and technological excellence in the area of Grid Computing. The main ...
Lire la suiteThis volume presents the accepted papers for the 4th International Conference on Grid and Cooperative Computing (GCC2005),held ...
Lire la suiteThis volume constitutes the proceedings of the 13th International Workshop on Groupware (CRIWG 2007). This workshop aims ...
Lire la suiteTopical sections include collaborative applications and group interaction, group awareness, computer supported collaborative ...
Lire la suiteThis book constitutes the refereed post-conference proceedings of the 14th International Workshop on Groupware: Design, Implementation, ...
Lire la suiteThis stimulating text/reference presents a philosophical exploration of the conceptual foundations of deep learning, presenting ...
Lire la suiteThe present book contains a collection of the best papers presented at the 5th International Conference on Interacción Persona ...
Lire la suiteBig Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, ...
Lire la suiteBig Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, ...
Lire la suiteThis Handbook presents a comprehensive and rigorous overview of the state-of-the-art on Smart Cities. It provides the reader ...
Lire la suiteDecision support systems have experienced a marked increase in attention and importance over the past 25 years. The aim of ...
Lire la suiteBegins with an overview of the technology landscape behind BERT. It takes you through the basics of NLP, including natural ...
Lire la suiteThis book constitutes the proceedings of the 12th International Conference on Human Haptic Sensing and Touch Enabled Computer ...
Lire la suite“Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies ...
Lire la suiteHardening is the process of protecting a system against unknown threats. System administrators harden against that which ...
Lire la suiteHierarchical matrices are an efficient framework for large-scale fully populated matrices arising, e.g., from the finite ...
Lire la suiteThis book constitutes the refereed proceedings of the 10th International Conference on Software Reuse, ICSR 2008, held in ...
Lire la suiteThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lire la suiteThe objective of this symposium is to exchange the latest research results in software, architecture, and applications in ...
Lire la suite