You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Volume 55 covers some particularly hot topics. Linda Harasim writes about education and the Web in "The Virtual University: A State of the Art." She discusses the issues that will need to be addressed if online education is to live up to expectations. Neville Holmes covers a related subject in his chapter "The Net, the Web, and the Children." He argues that the Web is an evolutionary, rather than revolutionary, development and highlights the division between the rich and the poor within and across nations. Continuing the WWW theme, George Mihaila, Louqa Raschid, and Maria-Esther Vidal look at the problems of using the Web and finding the information you want. Naren Ramakrishnan and Anath Gra...
This book constitutes the thoroughly refereed post-proceedings of the Second Workshop on Intelligent Techniques in Web Personalization, ITWP 2003, held in Acapulco, Mexico in August 2003 as part of IJCAI 2003, the 18th International Joint Conference on Artificial Intelligence. The 17 revised full papers presented were carefully selected and include extended versions of some of the papers presented at the ITWP 2003 workshop as well as a number of invited chapters by leading researchers in the field of Intelligent Techniques for Web Personalization. The papers are organized in topical sections on user modelling, recommender systems, enabling technologies, personalized information access, and systems and applications.
Data mining provides a set of new techniques to integrate, synthesize, and analyze tdata, uncovering the hidden patterns that exist within. Traditionally, techniques such as kernel learning methods, pattern recognition, and data mining, have been the domain of researchers in areas such as artificial intelligence, but leveraging these tools, techniques, and concepts against your data asset to identify problems early, understand interactions that exist and highlight previously unrealized relationships through the combination of these different disciplines can provide significant value for the investigator and her organization.
This volume contains 19 contributions from the International Symposium for Computational Science, 1999. Topics covered include delivery mechanisms for numerial algorithms, intelligent systems for recommending scientific software and the architecture of scientific problem-solving environments.
In 1995, the National Academy of Engineering initiated the Frontiers of Engineering Program, which brings together about 100 young engineering leaders at annual symposia to learn about cutting-edge research and technical work in a variety of engineering fields. The 2009 U.S. Frontiers of Engineering Symposium was held at The National Academies' Arnold O. and Mabel Beckman Center on September 10-12. Speakers were asked to prepare extended summaries of their presentations, which are reprinted in this volume. The intent of this book is to convey the excitement of this unique meeting and to highlight cutting-edge developments in engineering research and technical work.
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in hardware and software and in computer theory, design, and applications. It has also provided contributors with a medium in which they can examine their subjects in greater depth and breadth than that allowed by standard journal articles. As a result, many articles have become standard references that continue to be of significant, lasting value despite the rapid growth taking place in the field.This volume is organized around engineering large scale software systems. It discusses which technologies are useful for building these systems, which are useful to incorporate in these systems, and which are useful to evaluate these systems.
Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse detection for online social networks. Despite the seemingly diverse application domains, anomaly detection solutions share similar technical challenges, such as how to accurately recognize various normal patterns, how to reduce false alarms, how to adapt to concept drifts, and how to minimize performance impact. They also share similar detection approaches and evaluation methods, such as feature extraction, dimension reduction, and experimental evaluation. The main purpose of this b...
ThePaci?c-AsiaConferenceonKnowledgeDiscoveryandDataMining(PAKDD) has been held every year since 1997. PAKDD 2008, the 12th in the series, was heldatOsaka,JapanduringMay20–23,2008.PAKDDisaleadinginternational conference in the area of data mining. It provides an international forum for - searchers and industry practitioners to share their new ideas, original research results, and practical development experiences from all KDD-related areas - cluding data mining, data warehousing, machine learning, databases, statistics, knowledge acquisition, automatic scienti?c discovery, data visualization, causal induction, and knowledge-based systems. This year we received a total of 312 research papers...
The Fourth International Conference on Advanced Data Mining and Applications (ADMA 2008) will be held in Chengdu, China, followed by the last three successful ADMA conferences (2005 in Wu Han, 2006 in Xi'an, and 2007 Harbin). Our major goal of ADMA is to bring together the experts on data mining in the world, and to provide a leading international forum for the dissemination of original research results in data mining, including applications, algorithms, software and systems, and different disciplines with potential applications of data mining. This goal has been partially achieved in a very short time despite the young age of the conference, thanks to the rigorous review process insisted up...
The two-volume set LNCS 5544-5545 constitutes the refereed proceedings of the 9th International Conference on Computational Science, ICCS 2009, held in Baton Rouge, LA, USA in May 2008. The 60 revised papers of the main conference track presented together with the abstracts of 5 keynote talks and the 138 revised papers from 13 workshops were carefully reviewed and selected for inclusion in the three volumes. The general main track of ICSS 2009 was organized in about 20 parallel sessions addressing the following topics: e-Science Applications and Systems, Scheduling, Software Services and Tools, New Hardware and Its Applications, Computer Networks, Simulation of Complex Systems, Image Processing, Optimization Techniques, and Numerical Methods.