Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Practical Aspects of Knowledge Management: 6th Internatioal Conference, PAKM 2006, Vienna, Austria, November 30-December 1, 2006, Proceedings
Practical Aspects of Knowledge Management: 6th Internatioal Conference, PAKM 2006, Vienna, Austria, November 30-December 1, 2006, Proceedings
The biennial PAKM Conference Series offers a communication platform and meeting ground for practitioners and researchers involved in developing and deploying advanced business solutions for the management of knowledge in organizations. PAKM is a forum for people to share their views, exchange ideas, develop new insights, and envision completely new...
Inductive Logic Programming: 14th International Conference, ILP 2004, Porto, Portugal, September 6-8, 2004
Inductive Logic Programming: 14th International Conference, ILP 2004, Porto, Portugal, September 6-8, 2004
Napoleon once shot at a magazine editor and missed him and killed a publisher. But we remember with charity, that his intentions were good.” Fortunately, we live in more forgiving times, and are openly able to express our pleasure at being the editors of this volume containing the papers selected for presentation at the 14th International...
Ultra Low-Power Electronics and Design (Solid Mechanics and Its Applications)
Ultra Low-Power Electronics and Design (Solid Mechanics and Its Applications)
Power consumption is a key limitation in many high-speed and high-data-rate electronic systems today, ranging from mobile telecom to portable and desktop computing systems, especially when moving to nanometer technologies. Ultra Low-Power Electronics and Design offers to the reader the unique opportunity of accessing in an easy and...
Automatic Fingerprint Recognition Systems
Automatic Fingerprint Recognition Systems
Advances in automatic fingerprint recognition are driven by improved fingerprint sensing and advancements in areas such as computer architecture, pattern recognition, image processing, and computer vision. In addition to the new developments in science and technology, several recent social and political events have increased the level of interest...
Knowledge-Based Neurocomputing: A Fuzzy Logic Approach (Studies in Fuzziness and Soft Computing)
Knowledge-Based Neurocomputing: A Fuzzy Logic Approach (Studies in Fuzziness and Soft Computing)
In this monograph, the authors introduce a novel fuzzy rule-base, referred to as the Fuzzy All-permutations Rule-Base (FARB). They show that inferring the FARB, using standard tools from fuzzy logic theory, yields an input-output map that is mathematically equivalent to that of an artificial neural network. Conversely, every standard...
Next-Generation FTTH Passive Optical Networks: Research towards unlimited bandwidth access
Next-Generation FTTH Passive Optical Networks: Research towards unlimited bandwidth access
Fibre-to-the-Home networks constitute a fundamental telecom segment with the required potential to match the huge capacity of transport networks with the new user communication demands. Huge investments in access network infrastructure are expected for the next decade, with many initiatives already launched around the globe recently, driven by the...
Network Infrastructure Security
Network Infrastructure Security
Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure...
Access Nets: Third International Conference on Access Networks, AccessNets 2008, Las Vegas, NV, USA, October 15-17, 2008. Revised Papers
Access Nets: Third International Conference on Access Networks, AccessNets 2008, Las Vegas, NV, USA, October 15-17, 2008. Revised Papers

This book constitutes the thoroughly refereed post-conference proceedings of the Third International Conference on Access Networks, AccessNets 2008, held in Las Vegas, NV, USA, in October 2008.

The 30 revised full papers presented together with 5 invited papers were carefully reviewed and selected. The papers present original and...

Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance.

Power Analysis Attacks: Revealing the...

Control and Automation: International Conference, CA 2009, Held as Part of the Future Generation Information Technology Conference
Control and Automation: International Conference, CA 2009, Held as Part of the Future Generation Information Technology Conference

As future generation information technology (FGIT) becomes specialized and fragmented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances in one discipline may be transmitted to others. Presentation of recent results obtained in different disciplines encourages this interchange for the...

An Introduction to Statistical Learning: with Applications in R (Springer Texts in Statistics)
An Introduction to Statistical Learning: with Applications in R (Springer Texts in Statistics)

An Introduction to Statistical Learning provides an accessible overview of the field of statistical learning, an essential toolset for making sense of the vast and complex data sets that have emerged in fields ranging from biology to finance to marketing to astrophysics in the past twenty years. This book presents some of the most...

Ontology Matching
Ontology Matching

Ontologies tend to be found everywhere. They are viewed as the silver bullet for many applications, such as database integration, peer-to-peer systems, e-commerce, semantic web services, or social networks. However, in open or evolving systems, such as the semantic web, different parties would, in general, adopt different ontologies. Thus,...

unlimited object storage image
Result Page: 441 440 439 438 437 436 435 434 433 432 431 430 429 428 427 426 425 424 423 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy