Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Retrieval and Mining in Distributed Environments (Studies in Computational Intelligence)
Information Retrieval and Mining in Distributed Environments (Studies in Computational Intelligence)

At DART'09, held in conjunction with the 2009 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2009) and Intelligent Agent Technology (IAT 2009) in Milan (Italy), practitioners and researchers working on pervasive and intelligent access to web services and distributed information retrieval met to compare their work ad...

Web Application Security: Iberic Web Application Security Conference, IBWAS 2009
Web Application Security: Iberic Web Application Security Conference, IBWAS 2009

IBWAS 2009, the Iberic Conference on Web Applications Security, was the first international conference organized by both the OWASP Portuguese and Spanish chapters in order to join the international Web application security academic and industry communities to present and discuss the major aspects of Web applications security.

...

Management von IT-Projekten: Von der Planung zur Realisierung (Xpert.press)
Management von IT-Projekten: Von der Planung zur Realisierung (Xpert.press)

Kenntnisse des Projektmanagements und seine Anwendungsmöglichkeiten sind für IT-Manager und IT-Entwickler unentbehrlich. In diesem Buch werden die wichtigsten Verfahren und Methoden für das Management großer IT-Projekte vorgestellt. In die Darstellung lassen die Autoren ihre umfangreichen Erfahrungen bei der Führung...

Model Checking Software: 17th International SPIN Workshop, Enschede, The Netherlands
Model Checking Software: 17th International SPIN Workshop, Enschede, The Netherlands

This volume contains the proceedings of the 17th International SPIN Workshop on Model Checking Software (SPIN 2010). The workshop was organized by and held at the University of Twente, The Netherlands, on 27–29 September 2010. The workshop was co-located with the 5th International Conference on Graph Transformation (ICGT 2010)...

Rewriting Logic and Its Applications: 8th International Workshop, WRLA 2010
Rewriting Logic and Its Applications: 8th International Workshop, WRLA 2010
Rewriting is a form of inference, and one that interacts in several ways with other forms of inference such as decision procedures and proof search. We discuss a range of issues at the intersection of rewriting and inference. How can other inference procedures be combined with rewriting? Can rewriting be used to describe...
Information Security and Cryptology: 5th International Conference, Inscrypt 2009
Information Security and Cryptology: 5th International Conference, Inscrypt 2009

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Information Security and Cryptology, Inscrypt 2009, held in Beijing, China, in December 2009. The 22 revised full papers and 10 short papers presented were carefully reviewed and selected from 147 submissions. The papers are...

E-business Technology and Strategy: International Conference, CETS 2010, Ottawa, Canada
E-business Technology and Strategy: International Conference, CETS 2010, Ottawa, Canada

The International Conference on E-business Technology & Strategy (CETS) provides a peer-reviewed forum for researchers from across the globe to share contemporary research on developments in the fields of e-business, information technology and business strategy. It seeks to promote effective and vibrant networking among researchers and...

Lean Enterprise Software and Systems: First International Conference
Lean Enterprise Software and Systems: First International Conference

This book contains the refereed proceedings of the 1st International Conference on Lean Enterprise Software and Systems, LESS 2010, held in Helsinki, Finland, in October 2010.

LESS 2010 is the first scientific conference dedicated to advance the body of knowledge for lean enterprise software and systems development. To achieve this...

Schema Matching and Mapping (Data-Centric Systems and Applications)
Schema Matching and Mapping (Data-Centric Systems and Applications)

This book provides an overview about the state-of-the-art solutions and the most recent advances in schema matching and mapping, both recognized as key areas of metadata management. Tasks involving metadata are indeed pervasive in databases and information systems and include schema evolution, schema and ontology integration and matching, XML...

Artificial Intelligence and Computational Intelligence: International Conference, AICI 2010, Sanya, China
Artificial Intelligence and Computational Intelligence: International Conference, AICI 2010, Sanya, China
The 2010 International Conference on Artificial Intelligence and Computational Intelligence (AICI 2010) was held October 23–24, 2010 in Sanya, China. The AICI 2010 received 1,216 submissions from 20 countries and regions. After rigorous reviews, 105 high-quality papers were selected for publication in the AICI 2010...
Exact Exponential Algorithms (Texts in Theoretical Computer Science. An EATCS Series)
Exact Exponential Algorithms (Texts in Theoretical Computer Science. An EATCS Series)

For a long time computer scientists have distinguished between fast and slow algorithms. Fast (or good) algorithms are the algorithms that run in polynomial time, which means that the number of steps required for the algorithm to solve a problem is bounded by some polynomial in the length of the input. All other algorithms are slow (or bad)....

Recent Trends and Developments in Social Software: International Conferences on Social Software
Recent Trends and Developments in Social Software: International Conferences on Social Software

From its beginnings, the Internet has fostered communication, collaboration and networking between users. However, the first boom at the turn of the millennium was mainly driven by a rather one-sided interaction: e-commerce, portal sites and the broadcast models of mainstream media were introduced to theWeb. Over the last six or seven...

Result Page: Previous 3278 3279 3280 3281 3282 3283 3284 3285 3286 3287 3288 3289 3290 3291 3292 3293 3294 3295 3296 3297 3298 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy