You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This two volume set (CCIS 727 and 728) constitutes the refereed proceedings of the Third International Conference of Pioneering Computer Scientists, Engineers and Educators, ICPCSEE 2017 (originally ICYCSEE) held in Changsha, China, in September 2017. The 112 revised full papers presented in these two volumes were carefully reviewed and selected from 987 submissions. The papers cover a wide range of topics related to Basic Theory and Techniques for Data Science including Mathematical Issues in Data Science, Computational Theory for Data Science, Big Data Management and Applications, Data Quality and Data Preparation, Evaluation and Measurement in Data Science, Data Visualization, Big Data Mi...
This book constitutes the refereed proceedings of the 13th InternationalConference on Cooperative Design, Visualization, and Engineering, CDVE2016, held in Sydney, NSW, Australia, in October 2016. The 42 full papers and 9 short papers presented were carefully reviewed and selected from 89 submissions. The papers cover a broad range of topics in the field of cooperative visualization, visual analytics, cooperative engineering, and cooperative design and applications.
This two volume set (CCIS 623 and 634) constitutes the refereed proceedings of the Second International Conference of Young Computer Scientists, Engineers and Educators, ICYCSEE 2016, held in Harbin, China, in August 2016. The 91 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers are organized in topical sections on Research Track (Part I) and Education Track, Industry Track, and Demo Track (Part II) and cover a wide range of topics related to social computing, social media, social network analysis, social modeling, social recommendation, machine learning, data mining.
Updated to include the most current events and information on cyberterrorism, the second edition of Computer Forensics: Cybercriminals, Laws, and Evidence continues to balance technicality and legal analysis as it enters into the world of cybercrime by exploring what it is, how it is investigated, and the regulatory laws around the collection and use of electronic evidence. Students are introduced to the technology involved in computer forensic investigations and the technical and legal difficulties involved in searching, extracting, maintaining, and storing electronic evidence, while simultaneously looking at the legal implications of such investigations and the rules of legal procedure relevant to electronic evidence. Significant and current computer forensic developments are examined, as well as the implications for a variety of fields including computer science, security, criminology, law, public policy, and administration.
El correo electrónico en el aprendizaje del español como lengua extranjera
None
This is the second in a series of three proceedings of the 20th Pacific Basin Nuclear Conference (PBNC). This volume covers the topics of Operation and Maintenance, Supply Capability and Quality Control, Fuel Cycles, as well as New Technology and New Applications. As one in the most important and influential conference series of nuclear science and technology, the 20th PBNC was held in Beijing and the theme of this meeting was “Nuclear: Powering the Development of the Pacific Basin and the World”. It brought together outstanding nuclear scientist and technical experts, senior industry executives, senior government officials and international energy organization leaders from all across the world. The book is not only a good summary of the new developments in the field, but also a useful guideline for the researchers, engineers and graduate students.