The development of pattern recognition methods on the basis of so-called Markov
models is tightly coupled to the technological progress in the field of automatic
speech recognition. Today, however, Markov chain and hidden Markov models are
also applied in many other fields where the task is the modeling and analysis of
chronologically...
The Internet plays a significant and growing role in real-time industrial manufacturing, scheduling and management. A considerable research effort has led to the development of new technologies that make it possible to use the Internet for supervision and control of industrial processes.
Microsoft Access is a unique platform that enables rapid development of database applications. It has
been a long-time favorite of both developers and end users for creating single-user and small-scale office
automation solutions. Recent improvements have made it a viable choice for enterprise-class
applications as well. In this book,...
There are a lot of SharePoint books out there, and you might be wondering, why another? We know that different people buy books for different reasons. In this book, we cater to the busiest of professionals. We respect your time and understand that many of you don’t have time to read an 800-page tome. You need quick answers to real...
On behalf of the Organizing Committees, it is our pleasure towelcome you to
the proceedings of the 8th FTRA International Conference on Secure and Trust
Computing, Data Management, and Application (STA 2011),which was held in
Loutraki, Greece, June 28–30, 2011.
STA 2011 was the first conference after the merger of the...
Written in a cookbook style, this book offers solutions using a recipe-based approach. Each recipe contains step-by-step instructions followed by an analysis of what was done in each task and other useful information. The cookbook approach means you can dive into whatever recipes you want in no particular order. This book is for web...
On behalf of the Program Committee, it is our pleasure to present to you the
proceedings of the 8th Conference on Detection of Intrusions and Malware &
Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international
experts from academia, industry and government to present and discuss
novel security research....
This volume collects the proceedings of two related international conferences on
foundations and practical applications of mathematical methods of data analysis,
of Formal Concept Analysis and of methods for information extraction from
natural language texts. The first conference, named Knowledge - Ontology -
Theory 2007 (KONT 2007),...
Numerical analysis is the branch of mathematics that is used to find approximations to difficult
problems such as finding the roots of non-linear equations, integration involving complex
expressions and solving differential equations for which analytical solutions do not exist. It is
applied to a wide variety of disciplines such as...
The Handbook of Software Engineering and Knowledge Engineering is the first comprehensive handbook covering these two important areas that have become interwoven in recent years. Many international experts contribute to this Hand book. Each article is written in a way that a practitioner of software engineering and knowledge engineering can...
A book is like a window that allows you to look into the world. The window is
shaped by the author and that makes that every window presents a unique view of
the world. This is certainly true for this book. It is shaped by the topics and the
projects throughout my career. Even more so, this book reflects my own style of
working and...
Oracle Enterprise Manager Grid Control is a release of Oracle Enterprise Manager that's used to model and manage the entire Oracle Grid and beyond. It has capabilities to manage a number of databases and application servers, and can manage multiple instances of Oracle deployment platforms. Business Service Management (BSM) is a...