Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This book constitutes the thoroughly refereed conferenceproceedings of the Third International Workshop on Risk Assessment andRisk-driven Testing, RISK 2015, held in conjunction with the OMG TechnicalMeeting in Berlin, Germany, in June 2015. The revised 8 full papers were carefully reviewed and selectedfrom 12 submissions.
This book constitutes the refereed proceedings of the 7th International Work-Conference on Ambient Assisted Living, IWAAL 2015, held in Puerto Varas, Chile, in December 2015. The 20 full papers presented with 7 short papers were carefully reviewed and selected from 31 submissions.
This book constitutes the refereed proceedings of the 9th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2015, held in Puerto Varas, Chile, in December 2015. The 36 full papers presented together with 11 short papers were carefully reviewed and selected from 62 submissions.
This book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015. The 28 full papers were carefully reviewed and selected from 119 submissions.
This book constitutes the refereed proceedings of the 28th Australasian Joint Conference on Artificial Intelligence, AI 2015, held in Canberra, Australia, in November/December 2015. The 39 full papers and 18 short papers presented were carefully reviewed and selected from 102 submissions.
This book constitutes the refereed proceedings of the 38th Annual German Conference on Artificial Intelligence, KI 2015, held in Dresden, Germany, in September 2015.
This book constitutes the proceedings of the 26th International Conference on Algorithmic Learning Theory, ALT 2015, held in Banff, AB, Canada, in October 2015, and co-located with the 18th International Conference on Discovery Science, DS 2015.
This book constitutes the refereed proceedings of theSecond International Conference on Data Science, ICDS 2015, held in Sydney,Australia, during August 8-9, 2015. The 19 revised full papers and 5 short papers presentedwere carefully reviewed and selected from 31 submissions. data quality and data preparation;
This book constitutes the proceedings of the First International Workshop on Multimodal Retrieval in the Medical Domain, MRMD 2015, held in Vienna, Austria, on March 29, 2015.
To facilitate this, IDA 2015 will feature two tracks: a regular "Proceedings" track, as well as a "Horizon" track for early-stage research of potentially ground-breaking nature.
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics, CIBB 2014, held in Cambridge, UK, in June 2014. The 25 revised full papers presented were carefully reviewed and selected from 44 submissions.
The two-volume proceedings LNCS 9665 + 9666constitutes the thoroughly refereed proceedings of the 35th AnnualInternational Conference on the Theory and Applications of CryptographicTechniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016.
The two-volume proceedings LNCS 9665 + LNCS 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016.
This book constitutes the proceedings of the 14th IFIP TC 8 International Conference on Computer Information Systems and Industrial Management, CISIM 2015, held in Warsaw, Poland, in September 2015. The 47 papers presented in this volume were carefully reviewed and selected from about 80 submissions.
This book constitutes the thoroughly refereedpost-conference proceedings of the 6th International Conference on MathematicalAspects of Computer and Information Sciences, MACIS 2015, held in Berlin,Germany, in November 2015.The 48 revised papers presented together with 7 invitedpapers were carefully reviewed and selected from numerous submissions. Thepapers are grouped in topical sections on curves and surfaces, appliedalgebraic geometry, cryptography, verified numerical computation, polynomialsystem solving, managing massive data, computational theory of differential anddifference equations, data and knowledge exploration, algorithm engineering ingeometric computing, real complexity: theory and practice, global optimization,and general session.
This book constitutes the refereed proceedings of the 24th International Conference on Automated Reasoning with Analytic Tableaux and Related Methods, TABLEAUX 2015, held in Wroclaw, Poland, in September 2015. The 19 full papers and 2 papers presented in this volume were carefully reviewed and selected from 34 submissions.
This book constitutes the refereed proceedings of the 14th International Conference of the Italian Association for Artificial Intelligence, A*IA 2015, held in Ferrara, Italy, in September 2015. The 35 full papers presented were carefully reviewed and selected from 44 submissions.
This two-volume set (LNAI 9329 and LNAI 9330) constitutes the refereed proceedings of the 7th International Conference on Collective Intelligence, ICCCI 2014, held in Madrid, Spain, in September 2015. The 110 full papers presented were carefully reviewed and selected from 186 submissions.
This book constitutes the refereed proceedings of the 6th International Conference on Computational Logistics, ICCL 2015, held in Delft, The Netherlands, in September 2015.
This book constitutes the refereed proceedings of the 10th European Conference on Technology Enhanced Learning, EC-TEL 2015, held in Toledo, Spain, in September 2015. The 27 full papers, 19 short papers, 9 demo papers and 23 posters were carefully reviewed and selected from 176 submissions.
This book constitutes the proceedings of the Third International Workshop on Similarity Based Pattern Analysis and Recognition, SIMBAD 2015, which was held in Copenahgen, Denmark, in October 2015.
The papers are organized in topical sections on flight systems, automotive embedded systems, automotive software, error detection, medical safety cases, medical systems, architecture and testing, safety cases, security attacks, cyber security and integration, and programming and compiling.
This book constitutes the refereed proceedings of 5 workshops co-located with SAFECOMP 2015, the 34th International Conference on Computer Safety, Reliability, and Security, held in Delft, The Netherlands, in September 2015.
This book constitutes the proceedings of the 10th International Symposium on Frontiers of Combining Systems, FroCoS 2015, held in Wroclaw, Poland, in September 2015. The 20 papers presented in this volume were carefully reviewed and selected from 34 submissions. decision procedures; decision procedures for verification;
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim, Norway, in December 2014. The 8 revised full papers presented together with 2 revised short papers were carefully reviewed and selected from 30 initial submissions.
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions.
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.