1
Published 2010
Table of Contents: ...Invited Talks -- Fostering Proof Scores in CafeOBJ -- Exploiting Partial Success in Applying...
View full text
Electronic eBook
2
Published 2008
Table of Contents: ... -- Automating the Generation of Semantic Annotation Tools Using a Clustering Technique -- Information Retrieval...
View full text
Electronic eBook
3
Published 2008
Table of Contents: ... -- Resources for Situated Actions -- An Architecture and a Formal Description Technique for the Design...
View full text
Electronic eBook
4
Published 2007
Table of Contents: ... Time Complexities for Filtering Spam Messages -- Semantic Annotation -- Exploit Semantic Information...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ... Symbiotic Systems -- Embracing Uncertainty: The New Machine Intelligence -- Exploiting Social Structures...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ...: An Evolutionary Approach -- Flexible Information Systems Development: Designing an Appropriate Methodology...
View full text
Electronic eBook
7
Published 2011
Table of Contents: ... Clustering -- On the Analysis of Queues with Heavy Tails: A Non-extensive Maximum Entropy Formalism and a...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... Embedded Systems -- Error-Exploiting Video Encoder to Extend Energy/QoS Tradeoffs for Mobile Embedded...
View full text
Electronic eBook
9
Published 2005
Table of Contents: ... Ontologies -- Towards a Formal Verification of OWL-S Process Models -- Web Service Composition with Volatile...
View full text
Electronic eBook
10
Published 2006
Table of Contents: ... by Exploiting Semantic Relationships -- Using Fuzzy Conceptual Graphs to Map Ontologies -- Formalism-Independent...
View full text
Electronic eBook
11
Published 2008
Table of Contents: ... -- Load Information Sharing Policies In Communication-Intensive Parallel Applications -- A markov model...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ... Exploiting OPPL and OWL-API -- Experimenting with eXtreme Design -- Social Aspects and Tagging -- Weaving a...
View full text
Electronic eBook
13
Published 2012
Table of Contents: ... Learner Modeling -- Technology-Embraced Informal-in-Formal-Learning -- Towards Automatic Competence...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... -- VLSI Design and Implementation of Combined Secure Hash Algorithm SHA-512 -- Performance Comparison...
View full text
Electronic eBook
15
Published 2005
Table of Contents: ...Knowledge-Based Systems -- Platform-Based Product Design and Development: Knowledge Support...
View full text
Electronic eBook
16
Published 2010
Table of Contents: ... Information Systems and Formal Semantics of Programming Languages -- Applications and Case Studies -- Modeling...
View full text
Electronic eBook
17
Published 2005
Table of Contents: ... in Autonomic Communication -- An Ontology-Based Approach to Information Systems Security Management...
View full text
Electronic eBook
18
Published 2006
Subjects: ...Information storage and retrieval....
View full text
Electronic eBook
19
Published 2006
Table of Contents: ... Computing -- Exploiting Eye Gaze Information for Operating Services in Home Network System -- A Methodology...
View full text
Electronic eBook
20
Published 2007
Table of Contents: ... for Multilingual Resource Development and Intercultural Communication -- Exploiting Aligned Parallel Corpora...
View full text
Electronic eBook