![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer programming > Algorithms & procedures
This book constitutes the refereed proceedings of the 7th International Conference on Theory and Practice of Natural Computing, TPNC 2017, held in Dublin, Ireland, in December 2018. The 35 full papers presented in this book, together with one invited talk, were carefully reviewed and selected from 69 submissions. The papers are organized around the following topical sections: applications of natural computing as algorithms, bioinformatics, control, cryptography, design, economics. The more theoretical contributions handle with artificial chemistry, artificial immune systems, artificial life, cellular automata, cognitive computing, cognitive engineering, cognitive robotics, collective behaviour, complex systems, computational intelligence, computational social science, computing with words, developmental systems, DNA computing, DNA nanotechnology, evolutionary algorithms, evolutionary computing, evolutionary game theory, fractal geometry, fuzzy control, fuzzy logic, fuzzy sets, fuzzy systems, genetic algorithms, genetic programming, granular computing, heuristics, intelligent agents, intelligent systems, machine intelligence, molecular programming, neural computing, neural networks, quantum communication, quantum computing, rough sets, self-assembly.
This book constitutes the refereed proceedings of the 16th Ibero-American Conference on Artificial Intelligence, IBERAMIA 2018, held in Trujillo, Peru,in November 2018. The 41 papers presented were carefully reviewed and selected from 92 submissions. The papers are organized in the following topical sections: Knowledge Engineering, Knowledge Representation and Reasoning under Uncertainty., Multiagent Systems., Game Theory and Economic Paradigms, Game Playing and Interactive Entertainment, Ambient Intelligence, Machine Learning Methods, Cognitive Modeling,General AI, Knowledge Engineering, Computational Sustainability and AI, Heuristic Search and Optimization and much more.
This book explores inductive inference using the minimum message length (MML) principle, a Bayesian method which is a realisation of Ockham's Razor based on information theory. Accompanied by a library of software, the book can assist an applications programmer, student or researcher in the fields of data analysis and machine learning to write computer programs based upon this principle. MML inference has been around for 50 years and yet only one highly technical book has been written about the subject. The majority of research in the field has been backed by specialised one-off programs but this book includes a library of general MML-based software, in Java. The Java source code is available under the GNU GPL open-source license. The software library is documented using Javadoc which produces extensive cross referenced HTML manual pages. Every probability distribution and statistical model that is described in the book is implemented and documented in the software library. The library may contain a component that directly solves a reader's inference problem, or contain components that can be put together to solve the problem, or provide a standard interface under which a new component can be written to solve the problem. This book will be of interest to application developers in the fields of machine learning and statistics as well as academics, postdocs, programmers and data scientists. It could also be used by third year or fourth year undergraduate or postgraduate students.
This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.
This book discusses the security issues in a wide range of wireless devices and systems, such as RFID, Bluetooth, ZigBee, GSM, LTE, and GPS. It collects the findings of recent research by the UnicornTeam at 360 Technology, and reviews the state-of-the-art literature on wireless security. The book also offers detailed case studies and theoretical treatments - specifically it lists numerous laboratory procedures, results, plots, commands and screenshots from real-world experiments. It is a valuable reference guide for practitioners and researchers who want to learn more about the advanced research findings and use the off-the-shelf tools to explore the wireless world.
This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.
This two-volume set (CCIS 905 and CCIS 906) constitutes the refereed proceedings of the Second International Conference on Advances in Computing and Data Sciences, ICACDS 2018, held in Dehradun, India, in April 2018. The 110 full papers were carefully reviewed and selected from 598 submissions. The papers are centered around topics like advanced computing, data sciences, distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations.
This book constitutes the refereed conference proceedings of the 12th International Conference on Multi-disciplinary Trends in Artificial Intelligence, MIWAI 2018, held in Hanoi, Vietnam, in November 2018. The 16 full papers presented together with 9 short papers were carefully reviewed and selected from 65 submissions. They are organized in the following topical sections: control, planning and scheduling, pattern recognition, knowledge mining, software applications, strategy games and others.
This book constitutes the refereed proceedings of the 9th International Conference on Advances in Brain Inspired Cognitive Systems, BICS 2018, held in Xi'an, China, in July 2018. The 83 papers presented in this volume were carefully reviewed and selected from 137 submissions. The papers were organized in topical sections named: neural computation; biologically inspired systems; image recognition: detection, tracking and classification; data analysis and natural language processing; and applications.
This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018. The 21 full and 4 short papers presented were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on foundation. Public key encryption, digital signature, symmetric key cryptography, and applications.
This book constitutes the proceedings of the 31st Australasian Joint Conference on Artificial Intelligence, AI 2018, held in Wellington, New Zealand, in December 2018. The 50 full and 26 short papers presented in this volume were carefully reviewed and selected from 125 submissions. The paper were organized in topical sections named: agents, games and robotics; AI applications and innovations; computer vision; constraints and search; evolutionary computation; knowledge representation and reasoning; machine learning and data mining; planning and scheduling; and text mining and NLP.
This volume constitutes the proceedings of the 12th International Conference on Algorithmic Aspects in Information and Management, AAIM 2018, held in Dallas, Texas, USA, in December 2018. The 25 full papers presented were carefully reviewed and selected. The papers deal with current trends of research on algorithms, data structures, operation research, combinatorial optimization and their applications.
This book constitutes the proceedings of the 38th SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence, AI 2018, held in Cambridge, UK, in December 2018. The 25 full papers and 12 short papers presented in this volume were carefully reviewed and selected from 46 submissions. There are technical and application papers which were organized in topical sections named: Neural Networks; Planning and Scheduling; Machine Learning; Industrial Applications of Artificial Intelligence; Planning and Scheduling in Action; Machine Learning in Action; Applications of Machine Learning; and Applications of Agent Systems and Genetic Algorithms.
This book constitutes the refereed proceedings of the 19th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2018, held in Poitiers, France, in September 2018. The 52 full papers presented in this volume were carefully reviewed and selected from 91 submissions. They were organized in topical sections named: video analysis; segmentation and classification; remote sending; biometrics; deep learning; coding and compression; and image restauration and reconstruction.
This book constitutes the thoroughly refereed proceedings of the National Conference of Theoretical Computer Science, NCTCS 2018, held in Shanghai, China, in October 2018. The 11 full papers presented were carefully reviewed and selected from 31 submissions. They present relevant trends of current research in the area of algorithms and complexity, software theory and method, data science and machine learning theory.
This book constitutes the refereed conference proceedings of the 26th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2019, held in L'Aquila, Italy, in July 2019. The 19 full papers and 9 short papers presented in this book were carefully reviewed and selected from 39 submissions. They are devoted to the study of the interplay between structural knowledge, communication, and computing in decentralized systems of multiple communicating entities.
This book constitutes the refereed joint proceedings of the First International Workshop on Computational Pathology, COMPAY 2018, and the 5th International Workshop on Ophthalmic Medical Image Analysis, OMIA 2018, held in conjunction with the 21st International Conference on Medical Imaging and Computer-Assisted Intervention, MICCAI 2018, in Granada, Spain, in September 2018. The 19 full papers (out of 25 submissions) presented at COMPAY 2018 and the 21 full papers (out of 31 submissions) presented at OMIA 2018 were carefully reviewed and selected. The COMPAY papers focus on artificial intelligence and deep learning. The OMIA papers cover various topics in the field of ophthalmic image analysis.
This book constitutes the refereed proceedings of the 9th International Conference on Computational Logistics, ICCL 2018, held in Vietri sul Mare, Italy, in October 2018. The 32 full papers presented were carefully reviewed and selected from 71 submissions. They are organized in topical sections as follows: maritime shipping and routing, container handling and container terminals, vehicle routing and multi-modal transportation, network design and scheduling, logistics oriented combinatorial optimization.
This book constitutes the refereed proceedings of the 25th International Symposium on String Processing and Information Retrieval, SPIRE 2018, held in Lima, Peru, in October 2018. The 22 full papers and 6 short papers presented were carefully reviewed and selected from 51 submissions. They focus on fundamental studies on string processing and information retrieval, as well as on computational biology.
This book constitutes the refereed proceedings of the Second International Workshop on Connectomics in NeuroImaging, CNI 2018, held in conjunction with MICCAI 2018 in Granada, Spain, in September 2018. The 15 full papers presented were carefully reviewed and selected from 20 submissions. The papers deal with new advancements in network construction, analysis, and visualization techniques in connectomics and their use in clinical diagnosis and group comparison studies as well as in various neuroimaging applications.
This two-volume set (CCIS 905 and CCIS 906) constitutes the refereed proceedings of the Second International Conference on Advances in Computing and Data Sciences, ICACDS 2018, held in Dehradun, India, in April 2018. The 110 full papers were carefully reviewed and selected from 598 submissions. The papers are centered around topics like advanced computing, data sciences, distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations.
This treatise presents an integrated perspective on the interplay of set theory and graph theory, providing an extensive selection of examples that highlight how methods from one theory can be used to better solve problems originated in the other. Features: explores the interrelationships between sets and graphs and their applications to finite combinatorics; introduces the fundamental graph-theoretical notions from the standpoint of both set theory and dyadic logic, and presents a discussion on set universes; explains how sets can conveniently model graphs, discussing set graphs and set-theoretic representations of claw-free graphs; investigates when it is convenient to represent sets by graphs, covering counting and encoding problems, the random generation of sets, and the analysis of infinite sets; presents excerpts of formal proofs concerning graphs, whose correctness was verified by means of an automated proof-assistant; contains numerous exercises, examples, definitions, problems and insight panels.
This book constitutes the refereed proceedings of the 21st International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2018, held in Tokyo, Japan, in October/November 2018. The 27 full papers presented and 31 short papers were carefully reviewed and selected from 103 submissions. PRIMA presents subjects in many application domains, particularly in e-commerce, and also in planning, logistics, manufacturing, robotics, decision support, transportation, entertainment, emergency relief and disaster management, and data mining and analytics.
This book constitutes the refereed proceedings of the 21st Brazilian Symposium on Formal Methods, SBMF 2018, which took place in Salvador, Brazil, in November 2018. The 16 regular papers presented in this book were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections such as: techniques and methodologies; specification and modeling languages; theoretical foundations; verification and validation; experience reports regarding teaching formal methods; and applications.Chapter "TeSSLa: Temporal Stream-Based Specification Language" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
The three-volume set CCIS 923, CCIS 924, and CCIS 925 constitutes the thoroughly refereed proceedings of the First International Conference on Intelligent Manufacturing and Internet of Things, and of the 5th International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2018, held in Chongqing, China, in September 2018.The 135 revised full papers presented were carefully reviewed and selected from over 385 submissions.The papers of this volume are organized in topical sections on: clean energy; electric vehicles; energy saving; energy storages; power system analysis. |
![]() ![]() You may like...
Citizen Militia - Patriotic Civilians…
Rear Admiral Joseph H. Miller, Cathy Miller Cnrn
Hardcover
R876
Discovery Miles 8 760
Do Not Cry When I Die - A Holocaust…
Renee Salt, Kate Thompson
Paperback
|