Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now involves some...

Schema Matching and Mapping (Data-Centric Systems and Applications)
Schema Matching and Mapping (Data-Centric Systems and Applications)

This book provides an overview about the state-of-the-art solutions and the most recent advances in schema matching and mapping, both recognized as key areas of metadata management. Tasks involving metadata are indeed pervasive in databases and information systems and include schema evolution, schema and ontology integration and matching, XML...

Human-Computer Interaction: Second IFIP TC 13 Symposium, HCIS 2010
Human-Computer Interaction: Second IFIP TC 13 Symposium, HCIS 2010

The IFIP World Computer Congress (WCC) is one of the most important conferences in the area of computer science at the worldwide level and it has a federated structure, which takes into account the rapidly growing and expanding interests in this area. Informatics is rapidly changing and becoming more and more connected to a number of human...

Topological Methods in Data Analysis and Visualization: Theory, Algorithms, and Applications (Mathematics and Visualization)
Topological Methods in Data Analysis and Visualization: Theory, Algorithms, and Applications (Mathematics and Visualization)

The deluge of data observed throughout research and industry has turned the analysis of the resulting information into the primary limiting factor for the rapid progress of science, engineering, and medicine. The field of visualization strives to tackle this data analysis challenge by devising visual representations that afford users an...

Intelligent Computer Graphics 2010 (Studies in Computational Intelligence)
Intelligent Computer Graphics 2010 (Studies in Computational Intelligence)

Nowadays, intelligent techniques are more and more used in Computer Graphics in order to optimise the processing time, to find more accurate solutions for a lot of Computer Graphics problems, than with traditional methods, or simply to find solutions in problems where traditional methods fail.

The purpose of this volume is to...

Dependency Structures and Lexicalized Grammars: An Algebraic Approach
Dependency Structures and Lexicalized Grammars: An Algebraic Approach

This book reports the major results of roughly four years of doctoral research. Among the many people who have contributed to it, there are some to whom I owe a particularly large debt of gratitude.

Since 2002, FoLLI has awarded an annual prize for outstanding dissertations in the fields of Logic, Language and Information. This...

Soft Computing in XML Data Management: Intelligent Systems from Decision Making to Data Mining
Soft Computing in XML Data Management: Intelligent Systems from Decision Making to Data Mining

Being the de-facto standard for data representation and exchange over the Web, XML (Extensible Markup Language) allows the easy development of applications that exchange data over the Web. This creates a set of data management requirements involving XML. XML and related standards have been extensively applied in many business, service, and...

Essential Software Architecture
Essential Software Architecture

Job titles like “Technical Architect” and “Chief Architect” nowadays abound in software industry, yet many people suspect that “architecture” is one of the most overused and least understood terms in professional software development.

Gorton’s book tries to resolve this dilemma. It...

Approximation and Online Algorithms: 7th International Workshop, WAOA 2009, Copenhagen
Approximation and Online Algorithms: 7th International Workshop, WAOA 2009, Copenhagen

The 7th Workshop on Approximation and Online Algorithms (WAOA 2009) focused on the design and analysis of algorithms for online and computationally hard problems. Both kinds of problems have a large number of applications from a variety of fields. WAOA 2009 took place in Copenhagen, Denmark, during September 10–11, 2009. The workshop...

Functional and Logic Programming: 10th International Symposium, FLOPS 2010
Functional and Logic Programming: 10th International Symposium, FLOPS 2010

This volume contains the proceedings of the 10th International Symposium on Functional and Logic Programming (FLOPS 2010), held in Sendai, Japan, April 19–21, 2010 at Aoba Memorial Hall, Tohoku University.

FLOPS is a forum for research on all issues concerning declarative programming, including functional programming and...

Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)
Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them...

High Performance Computing on Vector Systems 2010
High Performance Computing on Vector Systems 2010

This book covers the results of the 11th and 12th Teraflop Workshop and continued a series initiated by NEC and the HLRS in 2004. As part of the TeraflopWorkbench, it has become a meeting platform for scientists, application developers, international experts and hardware designers to discuss the current state and future directions of...

unlimited object storage image
Result Page: 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 282 281 280 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy