Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Engineering Service Oriented Systems: A Model Driven Approach
Engineering Service Oriented Systems: A Model Driven Approach
Despite pressures of economic slowdown and the e-commerce bubble burst, moving towards e-services is a compelling necessity for todays organizations. Companies that are reluctant to adopt a service oriented architecture in their IT systems will be missing out on unprecedented opportunities to create business value with relatively small IT...
Approximation Methods for Efficient Learning of Bayesian Networks: Volume 168 Frontiers in Artificial Intelligence and Applications
Approximation Methods for Efficient Learning of Bayesian Networks: Volume 168 Frontiers in Artificial Intelligence and Applications

This publication offers and investigates efficient Monte Carlo simulation methods in order to realize a Bayesian approach to approximate learning of Bayesian networks from both complete and incomplete data. For large amounts of incomplete data when Monte Carlo methods are inefficient, approximations are implemented, such that learning remains...

Conceptual Modelling in Information Systems Engineering
Conceptual Modelling in Information Systems Engineering
Conceptual modeling has always been one of the cornerstones for information systems engineering as it describes the general knowledge of the system in the so-called conceptual schema.

Krogstie, Opdahl and Brinkkemper compiled 20 contributions from renowned researchers covering all aspects of conceptual modeling on the occasion of Arne...

Magento 2 Development Essentials
Magento 2 Development Essentials

Key Features

  • Create unique solutions for Magento 2 by developing and implementing solutions, themes, and extensions
  • Be proficient in the main functionalities, resources, and system structure of Magento 2
  • Get to grips with this practical and hands-on guide to raise your web development skills...
International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018 (Lecture Notes on Data Engineering and Communications Technologies)
International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018 (Lecture Notes on Data Engineering and Communications Technologies)

This book discusses data communication and computer networking, communication technologies and the applications of IoT (Internet of Things), big data, cloud computing and healthcare informatics. It explores, examines and critiques intelligent data communications and presents inventive methodologies in communication technologies and...

Emerging Research Directions in Computer Science
Emerging Research Directions in Computer Science

It is my pleasure to introduce this volume outlining new directions in computer science investigated by the junior researchers of the faculty of informatics at the Karlsruhe Institute of Technology (KIT). Each paper presents a young researcher’s scientific contributions and the research vision for a whole junior research group.

...

Building the E-Service Society: E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing)
Building the E-Service Society: E-Commerce, E-Business, and E-Government (IFIP International Federation for Information Processing)
Building the E-Service Society is a state-of-the-art book which deals with innovative trends in communication systems, information processing, and security and trust in electronic commerce, electronic business, and electronic government. It comprises the proceedings of I3E2004, the Fourth International Conference on E-Commerce,...
Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Computational Intelligence and Informatics: Principles and Practice (Studies in Computational Intelligence)
Computational Intelligence and Informatics: Principles and Practice (Studies in Computational Intelligence)

This volume contains a careful selection of papers that are based on and are extensions of corresponding lectures presented at the jubilee conference. The main subject area called Computational Intelligence includes diverse topics. Therefore, we offer snapshots rather than a full coverage of a small particular subject to the interested...

AVIEN Malware Defense Guide for the Enterprise
AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus companies were hard-pressed to match. AVIEN members represent the best-protected...
Electronic Commerce: Theory and Practice (Studies in Computational Intelligence)
Electronic Commerce: Theory and Practice (Studies in Computational Intelligence)
Electronic Commerce technologies have been studied widely in the field of Economics and Informatics. In recent years, there are multiple aspects of researches in electronic commerce including supply chain model, Internet auctions, Internet volume discounts, electronic bank and stock trading, and several others. The increase of Electronic Commerce...
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011
Detection of Intrusions and Malware, and Vulnerability Assessment: 8th International Conference, DIMVA 2011

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 8th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international experts from academia, industry and government to present and discuss novel security research....

Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy