0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (8)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Scientific and Statistical Database Management - 22nd International Conference, SSDBM 2010, Heidelberg, Germany, June 30-July... Scientific and Statistical Database Management - 22nd International Conference, SSDBM 2010, Heidelberg, Germany, June 30-July 2, 2010, Proceedings (Paperback, 2010 ed.)
Michael Gertz, Bertram Ludascher
R3,074 Discovery Miles 30 740 Ships in 10 - 15 working days

The International Conference on Scienti?c and Statistical Database Mana- ment (SSDBM) is an established forum for the exchange of the latest research resultsonconcepts,tools,andtechniquesforscienti?cdatabaseapplications. The nd 2010meeting markedthe 22 time that scienti?c domain experts, databases- searchers,practitioners,anddeveloperscametogethertosharetheirinsightsand to discuss future research directions in a stimulating environment. The conf- encewasheldfromJune30toJuly2atVillaBosch,neartheCarlBoschMuseum and Heidelberg Castle, overlooking the picturesque Neckar Valley. The conf- ence was organized at and co-sponsored by Heidelberg University and HITS, the Heidelberg Institute for Theoretical Studies, established in January 2010 by Dr. Klaus Tschira, co-founder of SAP AG, as a successor to the EML Research Institute. HITSfocuses onnew approachesandfoundations towardsinterpreting the rapidly increasing amounts of experimental data. Heidelberg University, the oldest university in Germany, was founded in 1386, is a German Excellence U- versity, and a top-ranking university in Europe and worldwide, known among other things for its excellence in the natural sciences and medicine. The univ- sity also hosts a unique Interdisciplinary Center for Scienti?c Computing (IWR) where grand challenges in the computational sciences are tackled, e. g. , climate and ocean modeling, turbulent ?ows, combustion, bio-molecules, and drug - sign. In 2010, SSDBM received a near-record number of 94 submissions from 27 countries. Each submission was reviewed by at least three of the 38 PC m- bers or externalreviewers. After careful consideration,41 papers (?44%) overall where accepted, 30 as long papers (?32%) and 11 short papers and demonst- tions. The reviewing process was managedby the EasyChair Conference System (www. easychair.

Domain-Sensitive Temporal Tagging (Paperback): Jannik Stroetgen, Michael Gertz Domain-Sensitive Temporal Tagging (Paperback)
Jannik Stroetgen, Michael Gertz
R1,397 Discovery Miles 13 970 Ships in 10 - 15 working days

This book covers the topic of temporal tagging, the detection of temporal expressions and the normalization of their semantics to some standard format. It places a special focus on the challenges and opportunities of domain-sensitive temporal tagging. After providing background knowledge on the concept of time, the book continues with a comprehensive survey of current research on temporal tagging. The authors provide an overview of existing techniques and tools, and highlight key issues that need to be addressed. This book is a valuable resource for researchers and application developers who need to become familiar with the topic and want to know the recent trends, current tools and techniques, as well as different application domains in which temporal information is of utmost importance. Due to the prevalence of temporal expressions in diverse types of documents and the importance of temporal information in any information space, temporal tagging is an important task in natural language processing (NLP), and applications of several domains can benefit from the output of temporal taggers to provide more meaningful and useful results. In recent years, temporal tagging has been an active field in NLP and computational linguistics. Several approaches to temporal tagging have been proposed, annotation standards have been developed, gold standard data sets have been created, and research competitions have been organized. Furthermore, some temporal taggers have also been made publicly available so that temporal tagging output is not just exploited in research, but is finding its way into real world applications. In addition, this book particularly focuses on domain-specific temporal tagging of documents. This is a crucial aspect as different types of documents (e.g., news articles, narratives, and colloquial texts) result in diverse challenges for temporal taggers and should be processed in a domain-sensitive manner.

Integrity, Internal Control and Security in Information Systems - Connecting Governance and Technology (Paperback, 2002 ed.):... Integrity, Internal Control and Security in Information Systems - Connecting Governance and Technology (Paperback, 2002 ed.)
Michael Gertz, Erik Guldentops, Leon A. M. Strous
R2,934 Discovery Miles 29 340 Ships in 10 - 15 working days

IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: * what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; * what is the status quo of research and development in this area; * where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: * Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. * Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. * Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT.

Integrity and Internal Control in Information Systems V - IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal... Integrity and Internal Control in Information Systems V - IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11-12, 2002, Bonn, Germany (Paperback, Softcover reprint of the original 1st ed. 2003)
Michael Gertz
R2,940 Discovery Miles 29 400 Ships in 10 - 15 working days

Integrity and Internal Control in Information Systems V represents a continuation of the dialogue between researchers, information security specialists, internal control specialists and the business community. The objectives of this dialogue are: -To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; -To present the results of research that may be used in the near future to increase the level of integrity or help management maintain the desired level of integrity; -To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general. The book contains a collection of papers from the Fifth International Working Conference on Integrity and Internal Control in Information Systems (IICIS), sponsored by the International Federation for Information Processing (IFIP) and held in Bonn, Germany in November 2002.

Handbook of Database Security - Applications and Trends (Paperback, Softcover reprint of hardcover 1st ed. 2008): Michael... Handbook of Database Security - Applications and Trends (Paperback, Softcover reprint of hardcover 1st ed. 2008)
Michael Gertz, Sushil Jajodia
R3,306 Discovery Miles 33 060 Ships in 10 - 15 working days

Handbook of Database Security: Applications and Trends provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. In addition to providing an overview of data security in different application settings, this book includes an outline for future research directions within the field. The book is designed for industry practitioners and researchers, and is also suitable for advanced-level students in computer science.

Handbook of Database Security - Applications and Trends (Hardcover): Michael Gertz, Sushil Jajodia Handbook of Database Security - Applications and Trends (Hardcover)
Michael Gertz, Sushil Jajodia
R4,610 Discovery Miles 46 100 Ships in 10 - 15 working days

Handbook of Database Security: Applications and Trends provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. In addition to providing an overview of data security in different application settings, this book includes an outline for future research directions within the field. The book is designed for industry practitioners and researchers, and is also suitable for advanced-level students in computer science.

Integrity and Internal Control in Information Systems V - IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal... Integrity and Internal Control in Information Systems V - IFIP TC11 / WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS) November 11-12, 2002, Bonn, Germany (Hardcover, 2003 ed.)
Michael Gertz
R3,022 Discovery Miles 30 220 Ships in 10 - 15 working days

Integrity and Internal Control in Information Systems V represents a continuation of the dialogue between researchers, information security specialists, internal control specialists and the business community. The objectives of this dialogue are:
-To present methods and techniques that will help business achieve the desired level of integrity in information systems and data;
-To present the results of research that may be used in the near future to increase the level of integrity or help management maintain the desired level of integrity;
-To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general.
The book contains a collection of papers from the Fifth International Working Conference on Integrity and Internal Control in Information Systems (IICIS), sponsored by the International Federation for Information Processing (IFIP) and held in Bonn, Germany in November 2002.

Integrity, Internal Control and Security in Information Systems - Connecting Governance and Technology (Hardcover, 2002 ed.):... Integrity, Internal Control and Security in Information Systems - Connecting Governance and Technology (Hardcover, 2002 ed.)
Michael Gertz, Erik Guldentops, Leon A. M. Strous
R3,090 Discovery Miles 30 900 Ships in 10 - 15 working days

IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: * what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; * what is the status quo of research and development in this area; * where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: * Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. * Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. * Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT.

Advances in Spatial and Temporal Databases - 15th International Symposium, SSTD 2017, Arlington, VA, USA, August 21 - 23, 2017,... Advances in Spatial and Temporal Databases - 15th International Symposium, SSTD 2017, Arlington, VA, USA, August 21 - 23, 2017, Proceedings (Paperback, 1st ed. 2017)
Michael Gertz, Matthias Renz, Xiaofang Zhou, Erik Hoel, Wei-Shinn Ku, …
R2,950 Discovery Miles 29 500 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Symposium on Spatial and Temporal Databases, SSTD 2017, held in Arlington, VA, USA, in August 2017.The 19 full papers presented together with 8 demo papers and 5 vision papers were carefully reviewed and selected from 90 submissions. The papers are organized around the current research on concepts, tools, and techniques related to spatial and temporal databases.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cricut Joy Machine
 (6)
R3,429 Discovery Miles 34 290
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Hot Water
Nadine Dirks Paperback R265 R207 Discovery Miles 2 070
Bibby's - More Good Food
Dianne Bibby Hardcover R480 R340 Discovery Miles 3 400
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Joseph Joseph Index Mini (Graphite)
R642 Discovery Miles 6 420
Poor Things
Emma Stone, Mark Ruffalo, … DVD R449 R329 Discovery Miles 3 290
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Cadac 47cm Paella Pan
R1,158 Discovery Miles 11 580
Ugreen Cat 6 UTP LAN Flat Cable (Black…
R51 Discovery Miles 510

 

Partners