You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The two volumes LNCS 10249 and 10250 constitute the refereed proceedings of the 14th International Semantic Web Conference, ESWC 2017, held in Portorož, Slovenia. The 51 revised full papers presented were carefully reviewed and selected from 183 submissions. In addition, 10 PhD papers are included, selected out of 14 submissions. The papers are organized in the following tracks: semantic data management, big data, and scalability; linked data; machine learning; mobile web, sensors, and semantic streams; natural language processing and information retrieval; vocabularies, schemas, and ontologies; reasoning; social web and web science; semantic web and transparency; in use and industrial track; and PhD symposium.
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018. The 33 full and 18 short papers were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on IoT security, user and data privacy, mobile security, wireless security, software security, cloud security, social network and enterprise security, network security, applied cryptography, and web security.
“Propagation, which looks at spreading in complex networks, can be seen from many viewpoints; it is undesirable, or desirable, controllable, the mechanisms generating that propagation can be the topic of interest, but in the end all depends on the setting. This book covers leading research on a wide spectrum of propagation phenomenon and the techniques currently used in its modelling, prediction, analysis and control. Fourteen papers range over topics including epidemic models, models for trust inference, coverage strategies for networks, vehicle flow propagation, bio-inspired routing algorithms, P2P botnet attacks and defences, fault propagation in gene-cellular networks, malware propagat...
This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students and practitioners a unique update on the latest advances in theory and a multitude of applications. It presents the peer-reviewed proceedings of the IX International Conference on Complex Networks and their Applications (COMPLEX NETWORKS 2020). The carefully selected papers cover a wide range of theoretical topics such as network models and measures; community structure, network dynamics; diffusion, epidemics and spreading processes; resilience and control as well as all the main network applications, including social and political networks; networks in finance and economics; biological and neuroscience networks and technological networks.
The two-volume set LNCS 10046 and 10047 constitutes the proceedings of the 8th International Conference on Social Informatics, SocInfo 2016, held in Bellevue, WA, USA, in November 2016. The 33 full papers and 34 poster papers presented in this volume were carefully reviewed and selected from 120 submissions. They are organized in topical sections named: networks, communities, and groups; politics, news, and events; markets, crowds, and consumers; and privacy, health, and well-being.
Governance of Automated Decision-Making and EU Law presents a comprehensive and nuanced exploration of the intricate relationship between technological innovation and democratic governance in Europe. Focused on preserving constitutional values within the European Union, the book rigorously examines the profound impact of information technologies on rule-making and decision-making processes. The dual objectives of the volume are to comprehensively explore the impact of innovative information technologies on the EU's public law and to devise future-proof regulatory strategies in the face of rapid technological advancements. Addressing the spread of information technology and automated decision...
This book constitutes the proceedings of the Workshops held at the International Conference on Social Informatics, SocInfo 2014, which took place in Barcelona, Spain, in November 2014. This year SocInfo 2014 included nine satellite workshops: the City Labs Workshop, the Workshop on Criminal Network Analysis and Mining, CRIMENET, the Workshop on Interaction and Exchange in Social Media, DYAD, the Workshop on Exploration of Games and Gamers, EGG, the Workshop on HistoInformatics, the Workshop on Socio-Economic Dynamics, Networks and Agent-based Models, SEDNAM, the Workshop on Social Influence, SI, the Workshop on Social Scientists Working with Start-Ups and the Workshop on Social Media in Crowdsourcing and Human Computation, SoHuman.
The Elvin warriors had traveled the cursed land of Midnight many times before, but never with two inexperienced girls to hinder their journey. Now they must escort April and Rebecca through the dark realm with hopes of making it to Waters Edge before the Elvin lord of this world, and his army, discover them. However, Legna has sensed the presence of the 'Chosen One' and is desperately trying to find her before she can escape, for he envisions himself as the prince to fulfill the prophecy with her. More of the prophecy will be revealed though as they encounter the 'Specter', and Death makes a demanding request of the 'Chosen One' before she can leave the forsaken valley. With war the only possible outcome for the Elvin world, they now also have to battle the world of men, but the human king will meet them with an unexpected power that could alter the outcome of both worlds. Can the Chosen One fulfill the prophecy before it's too late?
This book constitutes the thoroughly refereed post conference proceedings of the 4th edition of the Semantic Web Evaluation Challenge, SemWebEval 2017, co-located with the 14th European Semantic Web conference, held in Portoroz, Slovenia, in May/June 2017. This book includes the descriptions of all methods and tools that competed at SemWebEval 2017, together with a detailed description of the tasks, evaluation procedures and datasets. The 11 revised full papers presented in this volume were carefully reviewed and selected from 21 submissions. The contributions are grouped in the areas: the mighty storage challenge; open knowledge extraction challenge; question answering over linked data challenge; semantic sentiment analysis.