1
Published 2007
Table of Contents: ... with a Web Interface -- Web Sites Verification: An Abductive Logic Programming Tool -- Visual Logic...
View full text
Electronic eBook
2
Published 2008
Table of Contents: ... Identification -- Strategic Abilities of Agents -- Regular Papers -- Aggregation of Attack Relations: A Social...
View full text
Electronic eBook
3
Published 2005
Table of Contents: ... Technique for Digital Storytelling -- Graphics -- A New Constrained Texture Mapping Method -- Protect...
View full text
Electronic eBook
4
Published 2005
Table of Contents: ... Home Simulation and Control -- Aggregates and Preferences in Logic Programming -- The Chisholm Paradox...
View full text
Electronic eBook
5
Published 2010
Table of Contents: ... Design of Visual Analytics Methods -- User-Centered Design of Preference Elicitation Interfaces...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ...Keynote Speeches -- Programming Pervasive Spaces -- Ubiquitous Experience Media -- The Operating...
View full text
Electronic eBook
7
Published 2006
Table of Contents: ... Networking -- Data Aggregation for Target Tracking in Wireless Sensor Networks -- A Zone-Based Clustering...
View full text
Electronic eBook
8
Published 2005
Table of Contents: ... Expansion by WordNet -- Webified Video: Media Conversion from TV Programs to Web Content for Cross-Media...
View full text
Electronic eBook
9
Published 2005
Table of Contents: ... -- A Fluid Interface for Personal Digital Libraries -- MedioVis – A User-Centred Library Metadata...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ... on Decision Science -- On Designing Usable Policy Languages for Declarative Trust Aggregation -- An Image...
View full text
Electronic eBook
11
Published 2010
Table of Contents: ... Algorithm for Edge Detection in Fluorescent Cell Images -- A Non-rigid Multimodal Image Registration Method...
View full text
Electronic eBook
12
Published 2012
Table of Contents: ... -- An Analysis of Privacy Preserving Data Aggregation Protocols for WSNs -- Hybrid Obfuscated Javascript Strength...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ... Object-Z -- IDMS: A System to Verify Component Interface Completeness and Compatibility for Product...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... Processes: Organizing and Sharing Knowledge in Regional Development Programs Using Ontologies -- An Adaptive...
View full text
Electronic eBook
15
Published 2007
Table of Contents: ... Method Based on Received Signal Strength -- Optimization of the Switches in Storage Networks -- Migration...
View full text
Electronic eBook
16
Published 2005
Table of Contents: ...Invited Program -- COPS: Quality of Service vs. Any Service at All -- Beyond Middleware and QoS...
View full text
Electronic eBook
17
Published 2010
Table of Contents: ...Applications of Computational Intelligence -- A New Fault Detection Method of Induction Motor -- A...
View full text
Electronic eBook
18
Published 2007
Table of Contents: ... -- SKEMON: A Simple Certificate-Less Method for Key Exchange by Using Mobile Network -- Secure System...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... Identification in Deep Web Data Integration -- Learning to Detect Web Spam by Genetic Programming -- Semantic...
View full text
Electronic eBook
20
Published 2013
Table of Contents: ... Recommendation -- A Semantically Enhanced Tag-Based Music Recommendation Using Emotion Ontology -- A Method...
View full text
Electronic eBook