1
Published 2010
Table of Contents: ... Symbiotic Systems -- Embracing Uncertainty: The New Machine Intelligence -- Exploiting Social Structures...
View full text
Electronic eBook
2
Published 2010
Table of Contents: ...Invited Talks -- Fostering Proof Scores in CafeOBJ -- Exploiting Partial Success in Applying...
View full text
Electronic eBook
3
Published 2008
Table of Contents: ... -- Automating the Generation of Semantic Annotation Tools Using a Clustering Technique -- Information Retrieval...
View full text
Electronic eBook
4
Published 2008
Table of Contents: ... -- Resources for Situated Actions -- An Architecture and a Formal Description Technique for the Design...
View full text
Electronic eBook
5
Published 2007
Table of Contents: ... Time Complexities for Filtering Spam Messages -- Semantic Annotation -- Exploit Semantic Information...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ...-Based Materials to Activate Discussions -- Information Communication Technology in Innovation...
View full text
Electronic eBook
7
Published 2006
Table of Contents: ... Communication in Scale-Free Networks -- On Updated Data Dissemination Exploiting an Epidemic Model in Ad Hoc...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ...: An Evolutionary Approach -- Flexible Information Systems Development: Designing an Appropriate Methodology...
View full text
Electronic eBook
9
Published 2011
Table of Contents: ... Clustering -- On the Analysis of Queues with Heavy Tails: A Non-extensive Maximum Entropy Formalism and a...
View full text
Electronic eBook
10
Published 2006
Table of Contents: ... -- An Architecture for Autonomic Management of Ambient Networks -- Autonomic Communications: Exploiting Advanced...
View full text
Electronic eBook
11
Published 2008
Table of Contents: ... Embedded Systems -- Error-Exploiting Video Encoder to Extend Energy/QoS Tradeoffs for Mobile Embedded...
View full text
Electronic eBook
12
Published 2005
Table of Contents: ... in Autonomic Communication -- An Ontology-Based Approach to Information Systems Security Management...
View full text
Electronic eBook
13
Published 2005
Table of Contents: ... Ontologies -- Towards a Formal Verification of OWL-S Process Models -- Web Service Composition with Volatile...
View full text
Electronic eBook
14
Published 2006
Table of Contents: ... Strategies for Security Information Detection -- Design of an Emergency Prediction and Prevention Platform...
View full text
Electronic eBook
15
Published 2006
Table of Contents: ... by Exploiting Semantic Relationships -- Using Fuzzy Conceptual Graphs to Map Ontologies -- Formalism-Independent...
View full text
Electronic eBook
16
Published 2010
Table of Contents: ... Externalization -- Information Enrichment Using TaToo’s Semantic Framework -- Exploiting CReP for Knowledge...
View full text
Electronic eBook
17
Published 2010
Table of Contents: ... on Education of Childhood Folklore and Corporate Identification System Design -- Ancient-to-Modern Information...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ... of Robust Schedule for Profit Based Cooperation -- Designing a Genetic Algorithm to Solve an Integrated...
View full text
Electronic eBook
19
Published 2006
Table of Contents: ... Computing -- Exploiting Eye Gaze Information for Operating Services in Home Network System -- A Methodology...
View full text
Electronic eBook
20
Published 2007
Table of Contents: ... Support for Mobile Ad Hoc Networks -- Dual-Residue Montgomery Multiplication -- Design and Performance...
View full text
Electronic eBook