“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...
Lire la suiteThe book contains methodology, causation, and reduction, and include philosophy of logic and physics, philosophy of psychology ...
Lire la suiteThis book is about Rational Agents, which can be humans, players in a game, software programs or institutions. Typically, ...
Lire la suiteThis summons clearly resonates with the “archetypical image” associated with water as a basic element, discussed in Chapter ...
Lire la suiteAction planning has always played a central role in Artificial Intelligence. Given a description of the current situation, ...
Lire la suiteThis book examines social constructionism as a metatheory of psychology. It does not consider constructionist accounts of ...
Lire la suiteThis textbook highlights the many practical uses of stable distributions, exploring the theory, numerical algorithms, and ...
Lire la suiteThese papers address the latest research and development efforts and highlight the human aspects of design and use of computing ...
Lire la suiteVBSE extends the merely technical ISO software engineering definition with elements not only from economics, but also from ...
Lire la suiteLinks the formal theory of word vectors to the cognitive theory of linguistics. The computational linguists and deep learning ...
Lire la suiteThis book represents a contribution to the consolidation of the already vast amount of empirical knowledge and practical ...
Lire la suiteVirtual Heritage, Applied Technologies and Virtual Environments. With a truly international flavor, these sub-themes covered ...
Lire la suiteThis volume challenges the view that women have not contributed to the historical development of political ideas, and highlights ...
Lire la suiteImage analysis is a computational feat which humans show excellence in, in comp- ison with computers. Yet the list of applications ...
Lire la suiteThe volume is structured in three parts on theory and methodologies, techniques, and tools and applications.
Lire la suiteCombines visual inputs like image and video with a natural language question concerning the input and generates a natural ...
Lire la suiteThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Lire la suiteThe core of the book discusses alternative technology platforms for pre-packaging wafer level 3-D ICs, with an emphasis on ...
Lire la suiteThis book is organized in topical sections on grid computing and peer-to-peer systems; Web mining; rich Web user interfaces; ...
Lire la suiteThe First International Workshop on Web Information Systems Engineering for Electronic Businesses and Governments (E-BAG ...
Lire la suite