Search

Showing total 3,061 results

Search Constraints

Start Over You searched for: Topic computer science Remove constraint Topic: computer science Publisher springer-verlag Remove constraint Publisher: springer-verlag
3,061 results

Search Results

51. Discovering High-Utility Itemsets at Multiple Abstraction Levels

52. Slicing concurrent constraint programs

53. Recent Advances on Telematics Engineering

54. Forming classes in an e-Learning social network scenario

55. Analysis of Network Management and Monitoring using Cloud Computing

56. On Linear Hulls and Trails

57. Evidence analysis method using Bloom filter for MANET forensics

58. Research on an online self-organizing radial basis function neural network

59. Action boundaries detection in a video

60. Feature-space transformation improves supervised segmentation across scanners

61. Further Security Analysis of XTR

62. Security Analysis of CRT-Based Cryptosystems

63. Lessons Learned in Deploying Independent Living Technologies to Older Adults’ Homes

64. Why is Aligning Economic- and IT Services so Difficult?

65. A Case Study to Enable and Monitor Real IT Companies Migrating from Waterfall to Agile

66. The nutrition researcher cohort: toward a new generation of nutrition research and health optimization

67. Designing user interfaces for 'ordinary users in extraordinary circumstances': a keyboard-only web-based application for use in airports

68. The Race for Visibility and Value

69. Multi-objective optimal control of dynamic bioprocesses using ACADO Toolkit

70. Ubiquitous monitoring and assessment of childhood obesity

71. Towards a framework for the development of adaptable service-based applications

72. Masking vs. Multiparty Computation: How Large Is the Gap for AES?

73. Structured multi-class feature selection for effective face recognition

74. Breast Ultrasound Image Classification Based on Multiple-Instance Learning

75. Building the IJSO: An International Editorial Perspective

76. A General-Purpose Virtualization Service for HPC on Cloud Computing: An Application to GPUs

77. Building general purpose security services on trusted computing

78. Evaluation of Link System between Repository and Researcher Database

79. Wild Programming – One Unintended Experiment with Inquiry Based Learning

80. The Next Wave: Confexting

81. Strategic Planning, Environmental Dynamicity and Their Impact on Business Model Design: The Case of a Mobile Middleware Technology Provider

82. Challenges and trends in wireless ubiquitous computing systems

83. Automatic gender detection using on-line and off-line information

84. Meet-in-the-Middle Attacks on Reduced-Round XTEA

85. Artificial evolution in computer aided design: from the optimization of parameters to the creation of assembly programs

86. A mathematical programming tool for an efficient decision-making on teaching assignment under non-regular time schedules

87. The design-by-adaptation approach to universal access: learning from videogame technology

88. NTRULO: A Tunneling Architecture for Multimedia Conferencing over IP

89. Improving Task-based Plan Coordination

90. Near field communication and health: turning a mobile phone into an interactive multipurpose assistant in healthcare scenarios

91. Precise specification of design pattern structure and behaviour

92. Using Values to Turn Agents into Characters

93. From User Practice to ERP Customization: Reversing the Process

94. Model interoperability in building information modelling

95. Do you trust your phone?

96. Improved Distinguishing Attacks on HC-256

97. The Append-only Web Bulletin Board

98. Securing Real-time Sessions in an IMS-based Architecture

99. UML-Based Modeling for What-If Analysis

100. Mobility assessment in older people: new possibilities and challenges