![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer programming > Algorithms & procedures
This book constitutes the refereed proceedings of the 16th International Conference on Formal Engineering Methods, ICFEM 2014, held in Luxembourg, Luxembourg, in November 2014. The 28 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers cover a wide range of topics in the area of formal methods and software engineering and are devoted to advancing the state of the art of applying formal methods in practice. They focus in particular on combinations of conceptual and methodological aspects with their formal foundation and tool support.
The Role of the Computer in Statistics David Cox Nuffield College, Oxford OXIINF, U.K. A classification of statistical problems via their computational demands hinges on four components (I) the amount and complexity of the data, (il) the specificity of the objectives of the analysis, (iii) the broad aspects of the approach to analysis, (ill) the conceptual, mathematical and numerical analytic complexity of the methods. Computational requi rements may be limiting in (I) and (ill), either through the need for special programming effort, or because of the difficulties of initial data management or because of the load of detailed analysis. The implications of modern computational developments for statistical work can be illustrated in the context of the study of specific probabilistic models, the development of general statistical theory, the design of investigations and the analysis of empirical data. While simulation is usually likely to be the most sensible way of investigating specific complex stochastic models, computerized algebra has an obvious role in the more analyti cal work. It seems likely that statistics and applied probability have made insufficient use of developments in numerical analysis associated more with classical applied mathematics, in particular in the solution of large systems of ordinary and partial differential equations, integral equations and integra-differential equations and for the centsraction of "useful" in formation from integral transforms. Increasing emphasis on models incorporating specific subject-matter considerations is one route to bridging the gap between statistical ana."
During the period 1982-1985, six books of the series: Scientific Fun damentals of Robotics were published by Springer-Verlag. In chronolo gical order these were: Dynamics of Manipulation Robots: Theory and Application, by M. Vukobra tovic and V. Potkonjak, Control of Manipulation Robots: Theory and Ap plication, by M. vukobratovic and D. Stokic, Kinematics and Trajectory Synthesis of Manipulation Robots, by M. Vukobratovic and H. Kircanski, Real-Time Dynamics of Hanipulation Robots by M. Vukobratovic and N. Kircanski, Non-Adaptive and Adaptive Control of Manipulation Robots, by M. Vukobratovic, D. Stokic and N. Kircanski and Computer-Aided De sign and Applied Dynamics of Manipulation Robots, by M. Vukobratovic and V. Potkonjak. Within the series, during 1989, two monographs dealing with new sub jects will be published. So far, amongst the published monographs, Vol. 1 has been translated into Japanese, Volumes 2 and 5 into Russian, and Volumes 1-6 will appear in Chinese and Hungarian. In the author's opinion, the afore mentioned monographs, in principle, cover with sufficient breadth, the topics devoted to the design of ro bots and their control systems, at the level of post-graduate study in robotics. However, if this material was also to apply to the study of robotics at under-graduate level, it would have to be modified so as to obtain the character of a textbook. With this in mind, it must be noted that the subject matter contained in the text cannot be simpli fied but can only be elaborated in more detail."
This Brief presents a new method that is based on the author and his students' shared experience in applying a structured procedure that has as its main goal the creation of a material selection technique that uses language and employs a platform that is not restricted to engineers. Based on a hybrid approach that exploits both traditional and semi-quantitative concepts, it moves forward step-by step, and uses a platform based on a Quality Function Deployment matrix framework. Candidate materials are screened out and finally assessed by two user-friendly graphic analysis tools, one based on the value curve of the product and the other on an original Bubble Maps tool. The Brief is written for all those whose aim is for a better understanding of how to integrate and speed up the entire product development process from the initial product concept and engineering design phases to design specs, manufacturability and product marketing with optimal choice of materials.
This book constitutes the thoroughly refereed conference proceedings of the 7th International Conference on Multi-disciplinary Trends in Artificial Intelligence, MIWAI 2013, held in Krabi, Thailand, in December 2013. The 30 full papers were carefully reviewed and selected from 65 submissions and cover topics such as cognitive science, computational intelligence, computational philosophy, game theory, machine learning, multi-agent systems, natural language, representation and reasoning, speech, vision and the web.
This book and its companion volume, LNCS vol. 8794 and 8795 constitute the proceedings of the 5th International Conference on Swarm Intelligence, ICSI 2014, held in Hefei, China in October 2014. The 107 revised full papers presented were carefully reviewed and selected from 198 submissions. The papers are organized in 18 cohesive sections, 3 special sessions and one competitive session covering all major topics of swarm intelligence research and development such as novel swarm-based search methods; novel optimization algorithm; particle swarm optimization; ant colony optimization for travelling salesman problem; artificial bee colony algorithms; artificial immune system; evolutionary algorithms; neural networks and fuzzy methods; hybrid methods; multi-objective optimization; multi-agent systems; evolutionary clustering algorithms; classification methods; GPU-based methods; scheduling and path planning; wireless sensor networks; power system optimization; swarm intelligence in image and video processing; applications of swarm intelligence to management problems; swarm intelligence for real-world application.
The world of the twenty-?rst century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identi?cation is growing, not only in companies and organizations, but also in the world at large. Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. Identity management challenges the information security research community to focus on interdisciplinary and holistic approaches while retaining the bene?ts of previous research e?orts. As part of this tendency, surveillance and monitoring are more prominently present in society, both in the public and private domain. The original intention being to contribute to security and safety, surveillance and monitoring might, in some cases, have unintended or even contradictory e?ects. Besides, the - nipresence of surveillance and monitoring systems might be at daggers drawn with public and democratic liberties. In this context, IFIP (International Federation for Information Processing) Working Group 11.6 on Identity Management organized its second working c- ferenceonPoliciesandResearchinIdentityManagement(IDMAN2010)inOslo, Norway, November 18-19, 2010. Papers o?ering research contributions focusing on identity management in general and surveillance and monitoring in parti- lar were solicited for submission. The submitted papers were in general of high quality. All papers were reviewed by two to ?ve members of the international ProgramCommittee. Nine of the submitted papers, whicharepublishedin these proceedings, were ?nally unanimously accepted for presentationby the Program Committee. WeareverygratefultotheNorwegiangovernmentforfundingthisconferenc
This book constitutes the proceedings of the 15th International Conference on Distributed Computing and Networking, ICDCN 2014, held in Coimbatore, India, in January 2014. The 32 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 110 submissions. They are organized in topical sections named: mutual exclusion, agreement and consensus; parallel and multi-core computing; distributed algorithms; transactional memory; P2P and distributed networks; resource sharing and scheduling; cellular and cognitive radio networks and backbone networks.
The two-volume set LNCS 8258 and 8259 constitutes the refereed proceedings of the 18th Iberoamerican Congress on Pattern Recognition, CIARP 2013, held in Havana, Cuba, in November 2013. The 137 papers presented, together with two keynotes, were carefully reviewed and selected from 262 submissions. The papers are organized in topical sections on mathematical theory of PR, supervised and unsupervised classification, feature or instance selection for classification, image analysis and retrieval, signals analysis and processing, applications of pattern recognition, biometrics, video analysis, and data mining.
The two-volume set LNCS 8258 and 8259 constitutes the refereed proceedings of the 18th Iberoamerican Congress on Pattern Recognition, CIARP 2013, held in Havana, Cuba, in November 2013. The 137 papers presented, together with two keynotes, were carefully reviewed and selected from 262 submissions. The papers are organized in topical sections on mathematical theory of PR, supervised and unsupervised classification, feature or instance selection for classification, image analysis and retrieval, signals analysis and processing, applications of pattern recognition, biometrics, video analysis, and data mining.
This book constitutes the thoroughly refereed proceedings of the 15th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2013, held in Pozna, Poland, in October 2013. The 63 revised full papers were carefully selected from 111 submissions. The topics covered are aquisition, pre-processing and coding, biometry, classification and recognition, depth, 3D and tracking, efficient implementation and frameworks, low level image analysis, segmentation and video analysis."
This book constitutes the refereed proceedings of the Third International Conference on Advances in Visual Informatics, IVIC 2013, held in Selangor, Malaysia, in November 2013. The four keynotes and 69 papers presented were carefully reviewed and selected from various submissions. The papers focus on four tracks: computer visions and engineering; computer graphics and simulation; virtual and augmented reality; and visualization and social computing.
This book constitutes the refereed proceedings of the 8th Chinese Conference on Biometric Recognition, CCBR 2013, held in Jinan, China, in November 2013. The 57 revised full papers presented were carefully reviewed and selected from among 100 submissions. The papers address the problems in face, fingerprint, palm print, vein biometrics, iris and ocular biometrics, behavioral biometrics and other related topics, and contribute new ideas to research and development of reliable and practical solutions for biometric authentication.
This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users' privacy. The second approach considers a totally distributed environment where users perform privacy protection by themselves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection. This brief is designed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th International ICST Conference on Wireless Internet, WICON 2013, held in Shanghai, China, in April 2012. The 20 revised full papers were carefully reviewed and selected from numerous submissions. The papers cover topics such as vehicular communications and heterogeneous networks, cognitive radio and multi-antenna systems, networks and beyond, ad hoc and mesh networks.
This introduction to the Java language integrates a discussion of object-oriented programming with the design and implementation of data structures. It covers the most important topics, including algorithm analysis; time and space complexities; Java built-in data structure classes; input and output, data, and access streams; and the persistency of data.
This book constitutes the refereed proceedings of the 14th European Conference on Evolutionary Computation in Combinatorial Optimization, Evo COP 2014, held in Granada, Spain, in April 2014, co-located with the Evo*2014 events Euro GP, Evo BIO, Evo MUSART and Evo Applications. The 20 revised full papers presented were carefully reviewed and selected from 42 submissions. The papers cover the following topics: swarm intelligence algorithms, fitness landscapes and adaptive algorithms, real world and routing problems and cooperative and metaheuristic search.
The two-volume set LNAI 8265 and LNAI 8266 constitutes the proceedings of the 12th Mexican International Conference on Artificial Intelligence, MICAI 2013, held in Mexico City, Mexico, in November 2013. The total of 85 papers presented in these proceedings were carefully reviewed and selected from 284 submissions. The first volume deals with advances in artificial intelligence and its applications and is structured in the following five sections: logic and reasoning; knowledge-based systems and multi-agent systems; natural language processing; machine translation; and bioinformatics and medical applications. The second volume deals with advances in soft computing and its applications and is structured in the following eight sections: evolutionary and nature-inspired metaheuristic algorithms; neural networks and hybrid intelligent systems; fuzzy systems; machine learning and pattern recognition; data mining; computer vision and image processing; robotics, planning and scheduling and emotion detection, sentiment analysis and opinion mining.
This book constitutes the thoroughly refereed conference proceedings of the Third International Conference on Algorithmic Decision Theory, ADT 2013, held in November 2013 in Bruxelles, Belgium. The 33 revised full papers presented were carefully selected from more than 70 submissions, covering preferences in reasoning and decision making, uncertainty and robustness in decision making, multi-criteria decision analysis and optimization, collective decision making, learning and knowledge extraction for decision support.
This book constitutes the refereed proceedings of the 4th International Conference on Decision and Game Theory for Security, GameSec 2013, held in Fort Worth, TX, USA, in November 2013. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. The conference focuses on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. At the same time, the connection between theoretical models and real world security problems are emphasized to establish the important feedback loop between theory and practice. Observing the scarcity of venues for researchers who try to develop a deeper theoretical understanding of the underlying incentive and resource allocation issues in security, we believe that GameSec will fill an important void and serve as a distinguished forum of highest standards for years to come.
Parsing, the syntactic analysis of language, has been studied extensively in computer science and computational linguistics. Computer programs and natural languages share an underlying theory of formal languages and require efficient parsing algorithms. This introduction reviews the theory of parsing from a novel perspective. It provides a formalism to capture the essential traits of a parser that abstracts from the fine detail and allows a uniform description and comparison of a variety of parsers, including Earley, Tomita, LR, Left-Corner, and Head-Corner parsers. The emphasis is on context-free phrase structure grammar and how these parsers can be extended to unification formalisms. The book combines mathematical rigor with high readability and is suitable as a graduate course text.
N etwork-based computing domain unifies all best research efforts presented from single computer systems to networked systems to render overwhelming computational power for several modern day applications. Although this power is expected to grow with respect to time due to tech nological advancements, application requirements impose a continuous thrust on network utilization and on the resources to deliver supreme quality of service. Strictly speaking, network-based computing dornain has no confined scope and each element offers considerable challenges. Any modern day networked application strongly thrives on efficient data storage and management system, which is essentially a Database System. There have been nurnber of books-to-date in this domain that discuss fundamental principles of designing a database systern. Research in this dornain is now far matured and rnany researchers are venturing in this dornain continuously due to a wide variety of challenges posed. In this book, our dornain of interest is in exposing the underlying key challenges in designing algorithms to handle unpredictable requests that arrive at a Distributed Database System(DDBS) and evaluating their performance. These requests are otherwise called as on-line requests arriving at a system to process. Transactions in an on-line Banking service, Airline Reservation systern, Video-on-Demand systern, etc, are few examples of on-line requests."
This book constitutes the refereed proceedings of the 14th International Conference on Systems Simulation, Asia Simulation 2014, held in Kitakyushu, Japan, in October 2014. The 32 revised full papers presented were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections on modeling and simulation technology; network simulation; high performance computing and cloud simulation; numerical simulation and visualization; simulation of instrumentation and control application; simulation technology in diversified higher education; general purpose simulation.
This book constitutes the refereed proceedings of the 13th International Conference on Machine Learning and Cybernetics, Lanzhou, China, in July 2014. The 45 revised full papers presented were carefully reviewed and selected from 421 submissions. The papers are organized in topical sections on classification and semi-supervised learning; clustering and kernel; application to recognition; sampling and big data; application to detection; decision tree learning; learning and adaptation; similarity and decision making; learning with uncertainty; improved learning algorithms and applications.
This book constitutes thoroughly revised selected papers of the 5th International Conference on Numerical Analysis and ItsApplications, NAA 2012, held in Lozenetz, Bulgaria, in June 2012. The 65 revised papers presented were carefully reviewed and selected from various submissions. The papers cover a broad area of topics of interest such as numerical approximation and computational geometry; numerical linear algebra and numerical solution of transcendental equation; numerical methods for differential equations; numerical stochastics, numerical modeling; and high performance scientific computing." |
You may like...
Comprehensive Metaheuristics…
S. Ali Mirjalili, Amir Hossein Gandomi
Paperback
R3,956
Discovery Miles 39 560
|