Knowledge is considered as the most important asset in our modern society. It has now penetrated all facets of computing practice: from the rise of knowledge management to the Semantic Web and from the blog culture to...
详细信息
ISBN:
(数字)9783540876960
ISBN:
(纸本)9783540876953
Knowledge is considered as the most important asset in our modern society. It has now penetrated all facets of computing practice: from the rise of knowledge management to the Semantic Web and from the blog culture to the knowledge economy. This penetration has made proper knowledge engineering a most - quired feature. This volume contains the papers presented at the 16th International C- ference on Knowledge Engineering and Knowledge Management (EKAW 2008) held in Acitrezza, Sicily, Italy, September 29 to October 3 2008. EKAW 2008 is concerned with all aspects of eliciting, acquiring, modelling and managing knowledge, and their role in the construction of knowledge-intensive systems and services for the Semantic Web, knowledge management, e-business, natural language processing, intelligent integration information, etc. This year we paid special attention to the topic of “knowledge patterns” that can be considered as good practice or models that are appl.ed or reused throughout the knowledge engineering life cycle. Hence, beyond traditional t- icsofEKAW,wesolicitedpapersthatcoverresearchonhowtodescribe,classify, model, extract and appl. knowledge patterns in the design of ontologies, app- cations and products. We have paid special attention to the description of ex- riences that involve the appl.cation and identi?cation of knowledge patterns in social network analysis, natural language processing, multimedia analysis, p- tern recognition, etc.
For the sixth time, the German special interest group on Distributed Arti?cial Intelligence in cooperation with the Steering Committee of MATES organized the German Conference on Multiagent System Technologies – MATE...
详细信息
ISBN:
(数字)9783540878056
ISBN:
(纸本)9783540878049
For the sixth time, the German special interest group on Distributed Arti?cial Intelligence in cooperation with the Steering Committee of MATES organized the German Conference on Multiagent System Technologies – MATES 2008. This conference, which took place during September 23–26, 2008 in Kaisersla- ern, followed a series of successful predecessor conferences in Erfurt (2003, 2004, and 2006), Koblenz (2005), and Leipzig (2007). MATES 2008 was co-located with the 31st German Conference on Arti?cial Intelligence (KI 2008) and was hosted by the University of Kaiserslautern and the German Research Center for Arti?cial Intelligence (DFKI). As in recent years, MATES 2008 provided a distinguished, lively, and - terdisciplinary forum for researchers, users, and developers of agent technology to present and discuss the latest advances of research and development in the area of autonomous agents and multiagent systems. Accordingly, the topics of MATES 2008 covered the whole range: from the theory to appl.cations of agent and multiagent technology. In all, 35 papers were submitted from authors from 11 countries. The accepted 16 full papers included in this proceedings volume and presented as talks at the conference were chosen based on a thorough and highly selective review process. Each paper was reviewed and discussed by at least three Program Committee members and revised according to their c- ments. We believe that the papers of this volume are a representative snapshot of current research and contribute to both theoretical and appl.ed aspects of autonomous agents and multiagent systems.
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented togethe...
详细信息
ISBN:
(数字)9783319124759
ISBN:
(纸本)9783319124742
This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem.
Mobile Apps - Programme, die auf Smartphones ausgeführt werden - sind derzeit fast nur bei Konsumenten erfolgreich, während ein echtes App-Konzept im Business-Markt noch fehlt. Das Thema "Smart Mobile A...
详细信息
ISBN:
(数字)9783642222597
ISBN:
(纸本)9783642222580
Mobile Apps - Programme, die auf Smartphones ausgeführt werden - sind derzeit fast nur bei Konsumenten erfolgreich, während ein echtes App-Konzept im Business-Markt noch fehlt. Das Thema "Smart Mobile Apps" nimmt dieses Potenzial in Angriff: Intelligente Business-Apps werden Geschäftsprozesse im wahrsten Sinne des Wortes mobilisieren. Es entsteht ein mobiles Internet, das Geschäftsprozesse in allen Branchen befördern kann. Chancen dafür gibt es viele: Smartphones, Pads und Co. müssen sich nur in unser Denken integrieren. Durch sie kann Situationen intuitiv begegnet werden – am Flughafen nach dem Check-in, wenn noch eine Auslandsversicherung benötigt wird, oder direkt an einem Unfallort der Schaden aufgenommen werden soll. Informationen können den Kunden zeitnah und individualisiert zur Verfügung gestellt werden: so entstehen neue Märkte und Umsatzchancen.
The increasing costs of creating and maintaining infrastructures for delivering services to consumers have led to the emergence of cloud based third party service providers renting networks, computation power, storage...
详细信息
ISBN:
(数字)9783642192944
ISBN:
(纸本)9783642192937
The increasing costs of creating and maintaining infrastructures for delivering services to consumers have led to the emergence of cloud based third party service providers renting networks, computation power, storage, and even entire software appl.cation suites. On the other hand, service customers demand competitive pricing, service level agreements, and increased flexibility and scalability. Service consumers also expect process and data security, 24/7 service availability, and compliance with privacy regulations.
This book focuses on such challenges associated with the design, implementation, deployment, and management of data and software as a service. The 12 papers presented in this volume were contributed by leaders in academia and industry, and were reviewed and supervised by an expert editorial board. They describe cutting-edge approaches in areas like service design, service security, service optimization, and service migration.
This book constitutes the proceedings of the BPM Forum from the International Conference on Business Process Management, BPM 2016, held in Rio de Janeiro, September 2016.;The BPM Forum aims at gathering papers that sh...
详细信息
ISBN:
(数字)9783319454689
ISBN:
(纸本)9783319454672
This book constitutes the proceedings of the BPM Forum from the International Conference on Business Process Management, BPM 2016, held in Rio de Janeiro, September 2016.;The BPM Forum aims at gathering papers that showcase fresh ideas and emerging topics in BPM. They have to demonstrate substantial potential for stimulating interesting discussions, even if they are not yet completely matured. This way, 13 full papers were selected from 106 submissions, where each paper was reviewed by four PC members and by one Senior PC member who moderated the discussion and wrote the meta-review. The selected papers in this volume cover topics related to process modeling, process execution and management aspects of the BPM discipline.
暂无评论