![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer programming > Algorithms & procedures
This book constitutes the refereed proceedings of the 16th European
Conference on Genetic Programming, EuroGP 2013, held in Vienna,
Austria, in April 2013 co-located with the Evo* 2013 events,
EvoMUSART, EvoCOP, EvoBIO, and EvoApplications.
This book constitutes the refereed proceedings of the International Conference on the Applications of Evolutionary Computation, EvoApplications 2013, held in Vienna, Austria, in April 2013, colocated with the Evo* 2013 events EuroGP, EvoCOP, EvoBIO, and EvoMUSART. The 65 revised full papers presented were carefully reviewed and selected from 119 submissions. EvoApplications 2013 consisted of the following 12 tracks: EvoCOMNET (nature-inspired techniques for telecommunication networks and other parallel and distributed systems), EvoCOMPLEX (evolutionary algorithms and complex systems), EvoENERGY (evolutionary computation in energy applications), EvoFIN (evolutionary and natural computation in finance and economics), EvoGAMES (bio-inspired algorithms in games), EvoIASP (evolutionary computation in image analysis, signal processing, and pattern recognition), EvoINDUSTRY (nature-inspired techniques in industrial settings), EvoNUM (bio-inspired algorithms for continuous parameter optimization), EvoPAR (parallel implementation of evolutionary algorithms), EvoRISK (computational intelligence for risk management, security and defence applications), EvoROBOT (evolutionary computation in robotics), and EvoSTOC (evolutionary algorithms in stochastic and dynamic environments).
The book constitutes the refereed proceedings of the 11th International Conference on Adaptive and Natural Computing Algorithms, ICANNGA 2013, held in Lausanne, Switzerland, in April 2013. The 51 revised full papers presented were carefully reviewed and selected from a total of 91 submissions. The papers are organized in topical sections on neural networks, evolutionary computation, soft computing, bioinformatics and computational biology, advanced computing, and applications.
Data Analysis in Molecular Biology and Evolution introduces biologists to DAMBE, a proprietary, user-friendly computer program for molecular data analysis. The unique combination of this book and software will allow biologists not only to understand the rationale behind a variety of computational tools in molecular biology and evolution, but also to gain instant access to these tools for use in their laboratories. Data Analysis in Molecular Biology and Evolution serves as an excellent resource for advanced level undergraduates or graduates as well as for professionals working in the field.
High Performance Data Mining: Scaling Algorithms, Applications and Systems brings together in one place important contributions and up-to-date research results in this fast moving area. High Performance Data Mining: Scaling Algorithms, Applications and Systems serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
This book constitutes the refereed proceedings of the 21st International Colloquium on Structural Information and Communication Complexity, SIROCCO 2014, held in Takayama, Japan, in July 2014. The 24 full papers presented together with 5 invited talks were carefully reviewed and selected from 51 submissions. The focus of the colloquium is on following subjects Shared Memory and Multiparty Communication, Network Optimization, CONGEST Algorithms and Lower Bounds, Wireless networks, Aggregation and Creation Games in Networks, Patrolling and Barrier Coverage, Exploration, Rendevous and Mobile Agents.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Computers and Games, CG 2013, held in Yokohama, Japan, in August 2013, in conjunction with the 17th Computer and Games Tournament and the 20th World Computer-Chess Championship. The 21 papers presented were carefully reviewed and selected for inclusion in this book. They cover a wide range of topics which are grouped into five classes: Monte Carlo Tree Search and its enhancements; solving and searching; analysis of game characteristic; new approaches; and serious games.
It is important to understand what came before and how to meld new products with legacy systems. Network managers need to understand the context and origins of the systems they are using. Programmers need an understanding of the reasons behind the interfaces they must satisfy and the relationship of the software they build to the whole network. And finally, sales representatives need to see the context into which their products must fit.
Mathematical logic provides a conceptual framework for many different areas of science. It has been recognized recently that logic is also significant for data bases. To focus on this impor- tant topic, a group of researchers met at a workshop in Toulouse, France on November 16-18, 1977. The workshop was held at the Centre d'Etudes et de Recherches de L'Ecole Nationale Superieure de L'Aeronautique et de L'Espace de Toulouse (C. E. R. T. ). We are pleased to acknowledge the financial support received from the Direction des Recherches, Etudes et Techniques d'Armenent (D. R. E. T) and from C. E. R. T. Without this support the workshop would not have been possible. We particularly wish to thank our friend and colleague Jean Marie Nicolas for handling much of the organi- zation of the workshop. This book is a collection of substantially revised versions of the majority of the papers presented at the workshop. Every paper was reviewed carefully by at least two reviewers. Many thanks are due to our reviewers for their detailed reading of the papers and their constructive comments. The book provides, for the first time, a comprehensive descrip- tion of the interaction between logic and data bases.
Advances in optical technologies have made it possible to implement optical interconnections in future massively parallel processing systems. Photons are non-charged particles, and do not naturally interact. Consequently, there are many desirable characteristics of optical interconnects, e.g. high speed (speed of light), increased fanout, high bandwidth, high reliability, longer interconnection lengths, low power requirements, and immunity to EMI with reduced crosstalk. Optics can utilize free-space interconnects as well as guided wave technology, neither of which has the problems of VLSI technology mentioned above. Optical interconnections can be built at various levels, providing chip-to-chip, module-to-module, board-to-board, and node-to-node communications. Massively parallel processing using optical interconnections poses new challenges; new system configurations need to be designed, scheduling and data communication schemes based on new resource metrics need to be investigated, algorithms for a wide variety of applications need to be developed under the novel computation models that optical interconnections permit, and so on. Parallel Computing Using Optical Interconnections is a collection of survey articles written by leading and active scientists in the area of parallel computing using optical interconnections. This is the first book which provides current and comprehensive coverage of the field, reflects the state of the art from high-level architecture design and algorithmic points of view, and points out directions for further research and development.
Cryptography in Chinese consists of two characters meaning "secret coded". Thanks to Ch'in Chiu-Shao and his successors, the Chinese Remainder Theorem became a cornerstone of public key cryptography. Today, as we observe the constant usage of high-speed computers interconnected via the Internet, we realize that cryptography and its related applications have developed far beyond "secret coding". China, which is rapidly developing in all areas of technology, is also writing a new page of history in cryptography. As more and more Chinese become recognized as leading researchers in a variety of topics in cryptography, it is not surprising that many of them are Professor Xiao's former students. Progress on Cryptography: 25 Years of Cryptography in China is a compilation of papers presented at an international workshop in conjunction with the ChinaCrypt, 2004. After 20 years, the research interests of the group have extended to a variety of areas in cryptography. This edited volume includes 32 contributed chapters. The material will cover a range of topics, from mathematical results of cryptography to practical applications. This book also includes a sample of research, conducted by Professor Xiao's former and current students. Progress on Cryptography: 25 Years of Cryptography in China is designed for a professional audience, composed of researchers and practitioners in industry. This book is also suitable as a secondary text for graduate-level students in computer science, mathematics and engineering.
Many emerging technologies such as video conferencing, video-on-demand, and digital libraries require the efficient delivery of compressed video streams. For applications that require the delivery of compressed stored multimedia streams, the a priori knowledge available about these compressed streams can aid in the allocation of server and network resources. By using a client-side buffer, the resource requirements from the server and network can be minimized. Buffering Techniques for Delivery of Compressed Video in Video-on-Demand Systems presents a comprehensive description of buffering techniques for the delivery of compressed, prerecorded multimedia data. While these techniques can be applied to any compressed data streams, this book focusses primarily on the delivery of video streams because of the large resource requirements that they can consume. The book first describes buffering techniques for the continuous playback of stored video sources. In particular, several bandwidth smoothing (or buffering) algorithms that are provably optimal under certain conditions are presented. To provide a well-rounded discussion, the book then describes extensions that aid in the ability to provide interactive delivery of video across networks. Specifically, reservation techniques that take into account interactive functions such as fast-forward and rewind are described. In addition, extensions to the bandwidth smoothing algorithms presented in the first few chapters are described. These algorithms are designed with interactive, continuous playback of stored video in mind and are also provably optimal under certain constraints. Buffering Techniques for Delivery of Compressed Video in Video-on-Demand Systems serves as an excellent resource for multimedia systems, networking and video-on-demand designers, and may be used as a text for advanced courses on the topic.
This book constitutes the thoroughly refereed post-conference proceedings of the International Dagstuhl-Seminar on Efficient Algorithms for Global Optimization Methods in Computer Vision, held in Dagstuhl Castle, Germany, in November 2011. The 8 revised full papers presented were carefully reviewed and selected by 12 lectures given at the seminar. The seminar focused on the entire algorithmic development pipeline for global optimization problems in computer vision: modelling, mathematical analysis, numerical solvers and parallelization. In particular, the goal of the seminar was to bring together researchers from all four fields to analyze and discuss the connections between the different stages of the algorithmic design pipeline.
The development of a methodology for using logic databases is essential if new users are to be able to use these systems effectively to solve their problems, and this remains a largely unrealized goal. A workshop was organized in conjunction with the ILPS '93 Conference in Vancouver in October 1993 to provide a forum for users and implementors of deductive systems to share their experience. The emphasis was on the use of deductive systems. In addition to paper presentations, a number of systems were demonstrated. The papers of this book were drawn largely from the papers presented at the workshop, which have been extended and revised for inclusion here, and also include some papers describing interesting applications that were not discussed at the workshop. The applications described here should be seen as a starting point: a number of promising application domains are identified, and several interesting application packages are described, which provide the inspiration for further development.Declarative rule-based database systems hold a lot of promise in a wide range of application domains, and we need a continued stream of application development to better understand this potential and how to use it effectively. This book contains the broadest collection to date of papers describing implemented, significant applications of logic databases, and database systems as well as potential database users in such areas as scientific data management and complex decision support.
Welcome to the third International Conference on Management of Multimedia Networks and Services (MMNS'2000) in Fortaleza (Brazil)! The first MMNS was held in Montreal ( Canada) in july 1997 and the second MMNS was held in Versailles (France) in November 1998. The MMNS conference takes place every year and a half and is aimed to be a truly international event by bringing together researchers and practitioners from all around the world and by organising the conference each time in a different continent/country. Over the past several years, there has been a considerable amount of research within the fields of multimedia networking and network management. Much of that work has taken place within the context of managing Quality-of Service in broadband integrated services digital networks such as the A TM, and more recently in IP-based networks, to respond to the requirements of emerging multimedia applications. A TM networks were designed to support multimedia traffic with diverse characteristics and can be used as the transfer mode for both wired and wireless networks. A new set of Internet protocols is being developed to provide better quality of service, which is a prerequisite for supporting multimedia applications. Multimedia applications have a different set of requirements, which impacts the design of the underlying communication network as well as its management. Several QoS management mechanisms intervening at different layers of the communication network are required including QoS-routing, QoS-based transport, QoS negotiation, QoS adaptation, FCAPS management, and mobility management.
Usability has become increasingly important as an essential part of the design and development of software and systems for all sectors of society, business, industry, government and education, as well as a topic of research. Today, we can safely say that, in many parts of the world, information technology and communications is or is becoming a central force in revolutionising the way that we all live and how our societies function. IFIP's mission states clearly that it "encourages and assists in the development, exploitation and application of information technology for the benefit of all people". The question that must be considered now is how much attention has been given to the usability of the IT-based systems that we use in our work and daily lives. There is much evidence to indicate that the real interests and needs of people have not yet been embraced in a substantial way by IT decision makers and when developing and implementing the IT systems that shape our lives, both as private individuals and at work. But some headway has been made. Three years ago, the IFIP Technical Committee on Human Computer Interaction (IFIP TC13) gave the subject of usability its top priority for future work in advancing HCI within the international community. This Usability Stream of the IFIP World Computer Congress is a result of this initiative. It provides a showcase on usability involving some practical business solutions and experiences, and some research findings.
This book constitutes the refereed proceedings of the Second International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2012, held in Shanghai, China, in September 2012. The 60 full papers presented were carefully reviewed and selected from numerous submissions and present theories and methodologies as well as the emerging applications of intelligent computing in sustainable energy and environment.
Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include: -Role-Based Access Control; -Database Security; -XML Security; -Data Mining and Inference; -Multimedia System Security; -Network Security; -Public Key Infrastructure; -Formal Methods and Protocols; -Security and Privacy.
The growth of telecommunications has been largely based on mobile and data services in the past 10 years and this growth will continue. For instance, it is forecasted that after 2005 the mobile traffic turnover in Europe will exceed that of fixed telephone traffic, and the penetration of Internet access through mobile will exceed that of fixed access. It is expected that new value-added services will be Internet-based and that IP traffic will outweigh the amount of traditional ISDN based telephone traffic. The transition from existing telecommunications services to mobile and Internet-based services will change the service infrastructure as well as the customer and service management structures. This volume comprises the proceedings of the Working Conference on Personal Wireless Communications (PWC'2001), which was sponsored by the International Federation for Information Processing (IFIP) and organized by IFIP Working Group 6.8. It was held in Lappeenranta, Finland in August 2001. The PWC'2001 conference is a forum for tutorials, discussions and presentations of new developments in mobile and wireless research.The contributions to this volume have been divided into six categories that vary from voice over IP implementations to quality of service issues; from service aspects to performance and modelling issues; from modern cellular networks to future wireless systems. This volume will be essential reading for IT students and researchers as well as for theoreticians interested in the current state of the telecommunication systems.
This book constitutes the proceedings of the 9th International Computer Science Symposium in Russia, CSR 2014, held in Moscow, Russia, in June 2014. The 27 full papers presented in this volume were carefully reviewed and selected from 76 submissions. In addition the book contains 4 invited lectures. The scope of the proposed topics is quite broad and covers a wide range of areas in theoretical computer science and its applications.
Security and Privacy in the Age of Uncertainty covers issues related to security and privacy of information in a wide range of applications including: *Secure Networks and Distributed Systems; *Secure Multicast Communication and Secure Mobile Networks; *Intrusion Prevention and Detection; *Access Control Policies and Models; *Security Protocols; *Security and Control of IT in Society. This volume contains the papers selected for presentation at the 18th International Conference on Information Security (SEC2003) and at the associated workshops. The conference and workshops were sponsored by the International Federation for Information Processing (IFIP) and held in Athens, Greece in May 2003.
The comprehension of a traffic situation plays a major role in driving a vehicle. Interpretable information forms a basis for future projection, decision making and action performing, such as navigating, maneuvering and driving control. Michael Huelsen provides an ontology-based generic traffic situation description capable of supplying various advanced driver assistance systems with relevant information about the current traffic situation of a vehicle and its environment. These systems are enabled to perform reasonable actions and approach visionary goals such as injury and accident free driving, substantial assistance in arbitrary situations up to even autonomous driving.
This volume constitutes the refereed proceedings of the 11th International Conference on Applied Parallel and Scientific Computing, PARA 2012, held in Helsinki, Finland, in June 2012. The 35 revised full papers presented were selected from numerous submissions and are organized in five technical sessions covering the topics of advances in HPC applications, parallel algorithms, performance analyses and optimization, application of parallel computing in industry and engineering, and HPC interval methods. In addition, three of the topical minisymposia are described by a corresponding overview article on the minisymposia topic. In order to cover the state-of-the-art of the field, at the end of the book a set of abstracts describe some of the conference talks not elaborated into full articles.
High Performance Networking is a state-of-the-art book that deals with issues relating to the fast-paced evolution of public, corporate and residential networks. It focuses on the practical and experimental aspects of high performance networks and introduces novel approaches and concepts aimed at improving the performance, usability, interoperability and scalability of such systems. Among others, the topics covered include: * Java applets and applications; * distributed virtual environments; * new internet streaming protocols; * web telecollaboration tools; * Internet, Intranet; * real-time services like multimedia; * quality of service; * mobility. High Performance Networking comprises the proceedings of the Eighth International Conference on High Performance Networking, sponsored by the International Federation for Information Processing (IFIP), and was held at Vienna Univrsity of Technology, Vienna, Austria, in September 1998. High Performance Networking is suitable as a secondary text for a graduate level course on high performance networking, and as a reference for researchers and practitioners in industry.
This book constitutes the refereed proceedings of the 7th International Conference on Evolutionary Multi-Criterion Optimization, EMO 2013 held in Sheffield, UK, in March 2013. The 57 revised full papers presented were carefully reviewed and selected from 98 submissions. The papers are grouped in topical sections on plenary talks; new horizons; indicator-based methods; aspects of algorithm design; pareto-based methods; hybrid MCDA; decomposition-based methods; classical MCDA; exploratory problem analysis; product and process applications; aerospace and automotive applications; further real-world applications; and under-explored challenges. |
You may like...
Comprehensive Metaheuristics…
S. Ali Mirjalili, Amir Hossein Gandomi
Paperback
R3,956
Discovery Miles 39 560
|