| |
It still holds true: information is not always the answer. Information is often part of the problem. While the main goal of information in the business place is to - able adequate decisions and actions, it can also lead to numerous negative effects: it can confuse,...
Editeur :
Springer
Parution :
2006-08-25
PDF
|
This book contains the best papers of the First International Conference on E-business and Telecommunication Networks (ICETE 2004), held in Setúbal (Portugal) and organized by INSTICC (Institute for Systems and Technologies of Information, Communication and Control ) in...
Editeur :
Springer
Parution :
2006-08-18
PDF
|
This book provides theoretical and practical knowledge for develop ment of algorithms that infer linear and nonlinear models. It offers a methodology for inductive learning of polynomial neural network mod els from data. The design of such tools contributes to better...
Editeur :
Springer
Parution :
2006-08-18
PDF
|
Digital technology determines today’s world and will be one of the key technologies of the future. Successful technology development, introduction and management are not only a question of technical issues; due to their complexity a close cooperation between different...
Editeur :
Springer
Parution :
2006-08-15
PDF
|
In the summer of 1956, John McCarthy organized the famous Dartmouth Conference which is now commonly viewed as the founding event for the field of Artificial Intelligence. During the last 50 years, AI has seen a tremendous development and is now a well-established...
Editeur :
SAGE Publications Ltd
Parution :
2006-08-15
PDF
|
In today’s society the issue of security has become a crucial one. The use of knowledge-based technology in security applications emerges with important applications in monitoring, control, crisis, and rescue management. This volume contains extended and improved...
Editeur :
Springer
Parution :
2006-08-13
PDF
|
SVMs have emerged as very successful pattern recognition methods in recent years [16].SVMs have yielded superior performance in various applications such as; text categorization [15], and face detection [12], content-based image retrieval [6], and learning image...
Editeur :
Springer
Parution :
2006-08-11
PDF
|
Reliable human authentication schemes are of paramount importance in our highly networked society. Advances in biometrics help address the myriad of problems associated with traditional human recognition methods. The performance and benefits of a...
Editeur :
Springer
Parution :
2006-08-11
PDF
|
1 Multiagent Engineering: A New Software Construction Paradigm Multiagent systems have a long academic tradition. They have their roots in distributed problem solving in Artificial Intelligence (AI) from where they emerged in the mid-eighties as a distinctive...
Editeur :
Springer
Parution :
2006-08-10
PDF
|
ThisvolumeispublishedastheproceedingsoftheRussian-GermanAdvanced Research workshop on Computational Science and High Performance C- puting in Novosibirsk Academgorodok in September 2003. The contributions of these proceedings were provided and edited by the authors,...
Editeur :
Springer
Parution :
2006-08-10
PDF
|
This book describes the framework of inductive dependency parsing, a methodology for robust and efficient syntactic analysis of unrestricted natural language text. Coverage includes a theoretical analysis of central models and algorithms, and an empirical evaluation of...
Editeur :
Springer
Parution :
2006-08-05
PDF
|
The International Workshop on “Embedded Systems - Modeling, Techn- ogy, and Applications” is the seventh in a successful series of workshops that were established by Shanghai Jiao Tong University and Technische Universität Berlin.The goal of those workshops is to bring...
Editeur :
Springer
Parution :
2006-08-05
PDF
|
Rapid and unprecedented population ageing poses a serious social and economic challenge across the developed world. Shifts in dependency ratios point to escalating welfare and pensions costs which require radical and imaginative responses from Government and industry....
Editeur :
Springer
Parution :
2006-08-02
PDF
|
Business applications are designed using profound knowledge about the business domain, such as domain objects, fundamental domain-related principles, and domain patterns. Nonetheless, the pattern community's ideas for software engineering have not impacted at the...
Editeur :
Springer
Parution :
2006-08-02
PDF
|
Thinking about switching to Linux but find the prospect too daunting? Many people think it takes years of practice to become a Linux user. Actually, only takes a few tries to become fluent in the system and take advantage of all of its ...
Editeur :
For Dummies
Parution :
2006-07-31
PDF
|
A groundbreaking, unifying theory of computer science for low-cost, high-quality software The Cognitive Dynamics of Computer Science represents the culmination of more than thirty years of the author's hands-on experience in software development, which has resulted in...
Editeur :
Wiley-IEEE Computer Society Pr
Parution :
2006-07-28
Collection :
IEEE Press
PDF
|
• Motivation It is our dream to understand the principles of animals’ remarkable ability for adaptive motion and to transfer such abilities to a robot. Up to now, mechanisms for generation and control of stereotyped motions and adaptive motions in well-known simple...
Editeur :
Springer
Parution :
2006-07-28
PDF
|
After years of apparent dormancy, once again companies are paying more att- tion to information management. IT departments and CIOs are confronted with a number of new challenges, which force them to reconsider past information m- agement strategies and solutions....
Editeur :
Springer
Parution :
2006-07-25
PDF
|
Distributed networks such as the Internet have altered the fundamental way a record is created, captured, accessed and managed over time, and therefore who controls, has access to, and is responsible for its authenticity. Law and ethics provide the major sources of...
Editeur :
Springer
Parution :
2006-07-20
Collection :
The Archivist's Library
PDF
|
When you first hear the term information assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth, this is the Holy Grail...
Editeur :
Springer
Parution :
2006-07-19
Collection :
Computer Communications and Networks
PDF
|