Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...
Lire la suiteIntelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...
Lire la suiteIn the past few years, intelligence and security informatics (ISI) research, which is concerned with the study of the development ...
Lire la suiteThis book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, ...
Lire la suiteThis book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, ...
Lire la suiteThis book, INTELLIGENCE and SECURITY INFORMATICS: TECHNIQUES & APPLICATIONS, presents a collection of works discussing terrorism ...
Lire la suiteThe rapid growth in electronic systems in the past decade has boosted research in the area of computational intelligence. ...
Lire la suiteThe rapid growth in electronic systems in the past decade has boosted research in the area of computational intelligence. ...
Lire la suiteWeb personalizationcan be de?ned as any set of actions that can tailor the Web experience to a particular user or set of ...
Lire la suiteincludes high-quality research on various aspects of intelligent interactive multimedia technologies in healthcare services. ...
Lire la suiteThis book cover a wide range of topics from a technology to a business perspective and include among others hardware, software ...
Lire la suiteOn behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...
Lire la suiteLEGAL PROGRAMMING: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond provides ...
Lire la suiteThese proceedings contain the papers presented at the 3rd International S- posium on Location- and Context-Awareness in September ...
Lire la suitend These proceedings contain the papers presented at the 2 International Workshop on Location- and Context-Awareness in May ...
Lire la suiteThis three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...
Lire la suiteThe book deals with the management of information systems security and privacy, based on a model that covers technological, ...
Lire la suiteThis book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...
Lire la suiteThis book contains the proceedings of the second IFIP TC8 Working Conference on Mobile Information Systems which was held ...
Lire la suiteMobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless ...
Lire la suite