![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases > Data mining
This book constitutes the refereed proceedings of the 10th International Conference on Trust and Privacy in Digital Business, TrustBus 2013, held in Prague, Czech Republic, in August 2013 in conjunction with DEXA 2013. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: access control and authentication; identity and trust management; privacy and confidentiality management; information systems security; security policies/legal issues; and trust and privacy in mobile and pervasive environments.
This book constitutes the thoroughly refereed post-conference proceedings of the JSAI-isAI 2012 Workshops LENLS, JURISIN, ALSIP, MiMI, which tool place on November/December 2012, respectively, in Miyazaki, Japan. The 17 contributions in this volume were carefully reviewed and selected from 42 submissions.They are an excellent selection of papers that are representative of topics of AI research both in Japan an in other parts of the world. LENLS (Logic and Engineering of Natural Language Semantics) is an annual international workshop on formal semantics and pragmatics; its topics are the formal and theoretical aspects of natural language. JURISIN (Juris-Informatics) deals with juris-informatics. This workshop brings together people from various backgrounds such as law, social science, information and intelligent technology, logic and philosophy, including the conventional "AI and law" area. MiMI (Multimodality in Multispace Interaction) focuses on how multispace is managed in socially, temporally, and sequentially complex environments.
Collected articles in this series are dedicated to the development and use of software for earth system modelling and aims at bridging the gap between IT solutions and climate science. The particular topic covered in this volume addresses the Grid software which has become an important enabling technology for several national climate community Grids that led to a new dimension of distributed data access and pre- and post-processing capabilities worldwide.
This book constitutes the refereed proceedings of the International Second International Multi-Conference on Artificial Intelligence Technology, M-CAIT 2013, held in Shah Alam, in August 2013. The 25 revised full papers presented were carefully reviewed and selected from 110 submissions. M-CAIT 2013 hosted four special tracks in a single event: Intelligence Computation on Pattern Analysis and Robotics (ICPAIR 2013), Data Mining and Optimization (DMO 2013), Semantic Technology and Information Retrieval (STAIR 2013) and Industrial Computing & Applied Informatics (IComp 2013). The papers address issues of state-of-the-art research, development, implementation and applications within the four focus areas in CAIT: pattern recognition, data mining and optimization, knowledge technology and industrial computing.
This book constitutes the thoroughly refereed conference proceedings of the 5th International Conference on Computational Collective Intelligence, ICCCI 2013, held in Craiova, Romania, in September 2013. The 72 revised full papers presented were carefully selected from numerous submissions. Conference papers are organized in 16 technical sessions, covering the following topics: intelligent e-learning, classification and clustering methods, web intelligence and interaction, agents and multi-agent systems, social networks, intelligent knowledge management, language processing systems, modeling and optimization techniques, evolutionary computation, intelligent and group decision making, swarm intelligence, data mining techniques and applications, cooperative problem solving, collective intelligence for text mining and innovation, collective intelligence for social understanding and mining, and soft methods in collective intelligence.
This book constitutes the refereed proceedings of the 15th International Conference on Data Warehousing and Knowledge Discovery, DaWaK 2013 held in Prague, Czech Republic, in August 2013. The 24 revised full papers and 8 short papers presented were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on modeling and ETL, query optimization and parallelism, spatial data warehouses and applications, text mining and OLAP, recommendation and prediction, data mining optimization and machine learning techniques, mining and processing data streams, clustering and data mining applications, social network and graph mining, and event sequence and Web mining.
This book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on Agents and Data Mining Interaction, ADMI 2012, held in Valencia, Spain, in June 2012. The 16 revised full papers were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on agents for data mining, data mining for agents, and agent mining applications.
Data mining is a very active research area with many successful real-world app- cations. It consists of a set of concepts and methods used to extract interesting or useful knowledge (or patterns) from real-world datasets, providing valuable support for decision making in industry, business, government, and science. Although there are already many types of data mining algorithms available in the literature, it is still dif cult for users to choose the best possible data mining algorithm for their particular data mining problem. In addition, data mining al- rithms have been manually designed; therefore they incorporate human biases and preferences. This book proposes a new approach to the design of data mining algorithms. - stead of relying on the slow and ad hoc process of manual algorithm design, this book proposes systematically automating the design of data mining algorithms with an evolutionary computation approach. More precisely, we propose a genetic p- gramming system (a type of evolutionary computation method that evolves c- puter programs) to automate the design of rule induction algorithms, a type of cl- si cation method that discovers a set of classi cation rules from data. We focus on genetic programming in this book because it is the paradigmatic type of machine learning method for automating the generation of programs and because it has the advantage of performing a global search in the space of candidate solutions (data mining algorithms in our case), but in principle other types of search methods for this task could be investigated in the future.
This book constitutes the refereed proceedings of the 8th International Conference on Advances in Natural Language Processing, JapTAL 2012, Kanazawa, Japan, in October 2012. The 27 revised full papers and 5 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on machine translation, multilingual issues, resouces, semantic analysis, sentiment analysis, as well as speech and generation.
The inspiring idea of this workshop series, Artificial Intelligence Approaches to the Complexity of Legal Systems (AICOL), is to develop models of legal knowledge concerning organization, structure, and content in order to promote mutual understanding and communication between different systems and cultures. Complexity and complex systems describe recent developments in AI and law, legal theory, argumentation, the Semantic Web, and multi-agent systems. Multisystem and multilingual ontologies provide an important opportunity to integrate different trends of research in AI and law, including comparative legal studies. Complexity theory, graph theory, game theory, and any other contributions from the mathematical disciplines can help both to formalize the dynamics of legal systems and to capture relations among norms. Cognitive science can help the modeling of legal ontology by taking into account not only the formal features of law but also social behaviour, psychology, and cultural factors. This book is thus meant to support scholars in different areas of science in sharing knowledge and methodological approaches. This volume collects the contributions to the workshop's third edition, which took place as part of the 25th IVR congress of Philosophy of Law and Social Philosophy, held in Frankfurt, Germany, in August 2011. This volume comprises six main parts devoted to the each of the six topics addressed in the workshop, namely: models for the legal system ethics and the regulation of ICT, legal knowledge management, legal information for open access, software agent systems in the legal domain, as well as legal language and legal ontology.
This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on New Frontiers in Mining Complex Patterns, NFMCP 2012, held in conjunction with ECML/PKDD 2012, in Bristol, UK, in September 2012. The 15 revised full papers were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on mining rich (relational) datasets, mining complex patterns from miscellaneous data, mining complex patterns from trajectory and sequence data, and mining complex patterns from graphs and networks.
A large international conference on Advances in Machine Learning and Data Analysis was held in UC Berkeley, California, USA, October 22-24, 2008, under the auspices of the World Congress on Engineering and Computer Science (WCECS 2008). This volume contains sixteen revised and extended research articles written by prominent researchers participating in the conference. Topics covered include Expert system, Intelligent decision making, Knowledge-based systems, Knowledge extraction, Data analysis tools, Computational biology, Optimization algorithms, Experiment designs, Complex system identification, Computational modeling, and industrial applications. Advances in Machine Learning and Data Analysis offers the state of the art of tremendous advances in machine learning and data analysis and also serves as an excellent reference text for researchers and graduate students, working on machine learning and data analysis.
This work presents a data visualization technique that combines graph-based topology representation and dimensionality reduction methods to visualize the intrinsic data structure in a low-dimensional vector space. The application of graphs in clustering and visualization has several advantages. A graph of important edges (where edges characterize relations and weights represent similarities or distances) provides a compact representation of the entire complex data set. This text describes clustering and visualization methods that are able to utilize information hidden in these graphs, based on the synergistic combination of clustering, graph-theory, neural networks, data visualization, dimensionality reduction, fuzzy methods, and topology learning. The work contains numerous examples to aid in the understanding and implementation of the proposed algorithms, supported by a MATLAB toolbox available at an associated website.
This book constitutes the refereed proceedings of the 14th International Conference on Web-Age Information Management, WAIM 2013, held in Beidaihe, China, in June 2013. The 47 revised full papers presented together with 29 short papers and 5 keynotes were carefully reviewed and selected from a total of 248 submissions. The papers are organized in topical sections on data mining; information integration and heterogeneous systems; big data; spatial and temporal databases; information extraction; new hardware and miscellaneous; query processing and optimization; social network and graphs; information retrieval; workflow systems and service computing; recommender systems; security, privacy, and trust; semantic Web and ontology.
This book constitutes the thoroughly refereed post-workshop proceedings of 5 workshops, held at the 10th International Conference on Autonomous Agents and Multiagent Systems, AAMAS 2011, in Taipei, Taiwan, May 2-6, 2011. The 37 revised full papers presented together with 1 invited paper were carefully reviewed and selected from numerous submissions. The papers are organized in sections on the workshops Agent-Based Modeling for Policy Engineering (AMPLE), Agent-Oriented Software Engineering (AOSE), Autonomous Robots and Multirobot Systems (ARMS), Data Oriented Constructive Mining and Multi-Agent Simulation, Massively Multi-Agent Systems: Models, Methods and Tools (DOCM(3)AS), and Infrastructures and Tools for Multiagent Systems (ITMAS).
This book constitutes the refereed proceedings of the 9th International Meeting on Computational Intelligence Methods for Bioinformatics and Biostatistics, CIBB 2012, held in Houston, TX, USA during in July 2012. The 16 revised full papers presented were carefully reviewed and selected from 23 submissions. The papers are organized in topical sections on relativistic heavy ions and DNA damage; image segmentation; proteomics; RNA and DNA sequence analysis; RNA, DNA, and SNP microarrays; semi-supervised/unsupervised cluster analysis.
The two-volume set LNCS 7649 + 7650 constitutes the refereed proceedings of the 11th International Semantic Web Conference, ISWC 2012, held in Boston, MA, USA, in November 2012. The International Semantic Web Conference is the premier forum for Semantic Web research, where cutting edge scientific results and technological innovations are presented, where problems and solutions are discussed, and where the future of this vision is being developed. It brings together specialists in fields such as artificial intelligence, databases, social networks, distributed computing, Web engineering, information systems, human-computer interaction, natural language processing, and the social sciences. Volume 1 contains a total of 41 papers which were presented in the research track. They were carefully reviewed and selected from 186 submissions. Volume 2 contains 17 papers from the in-use track which were accepted from 77 submissions. In addition, it presents 8 contributions to the evaluations and experiments track and 7 long papers and 8 short papers of the doctoral consortium.
Social Tagging Systems are web applications in which users upload resources (e.g., bookmarks, videos, photos, etc.) and annotate it with a list of freely chosen keywords called tags. This is a grassroots approach to organize a site and help users to find the resources they are interested in. Social tagging systems are open and inherently social; features that have been proven to encourage participation. However, with the large popularity of these systems and the increasing amount of user-contributed content, information overload rapidly becomes an issue. Recommender Systems are well known applications for increasing the level of relevant content over the "noise" that continuously grows as more and more content becomes available online. In social tagging systems, however, we face new challenges. While in classic recommender systems the mode of recommendation is basically the resource, in social tagging systems there are three possible modes of recommendation: users, resources, or tags. Therefore suitable methods that properly exploit the different dimensions of social tagging systems data are needed. In this book, we survey the most recent and state-of-the-art work about a whole new generation of recommender systems built to serve social tagging systems. The book is divided into self-contained chapters covering the background material on social tagging systems and recommender systems to the more advanced techniques like the ones based on tensor factorization and graph-based models.
This book constitutes the refereed proceedings of the 13th International Conference on Web-Age Information Management, WAIM 2012, held in Harbin, China in August 2012. The 32 revised full papers presented together with 10 short papers and three keynotes were carefully reviewed and selected from a total of 178 submissions. The papers are organized in topical sections on wireless sensor networks; data warehousing and data mining; query processing; spatial databases; similarity search and queries; XML and Web data; graph and uncertain data; distributed computing; data security and management; information extraction and integration; and social networks and modern Web services.
About two years ago, while attending yet another international standards meeting, a few of the meeting participants were discussing the utility and applicability of the standards we were designing. After all, if standards are not used, and used effectively, why are we spending all this time and money designing them? The ultimate test of the utility of computer standards is the number of implementations that are developed and the number of end-users that successfully use these within their own application. The number of implementations is related to the quality of a standard because vendors cannot produce correct implementations without clear, precise and unambiguous semantics within the standard. The number of users of implementations of the standards is an even greater measure of success of the standard because users will only purchase these implementations if they are useful for their applications. "How could we determine whether or not graphics standards are useful?" we asked ourselves. " Let's ask both implementors and users about the experiences they've had with our standards. Let them tell us about the successes and the problems as well. " Thus, an idea was born - the idea of a series of workshops, each one devoted to the usability of a different computer graphics standard. The only thing left to do in planning this workshop was to choose the appropriate standard to serve as the focus of the first workshop. There were only a few viable candidates.
Anonymization of Electronic Medical Records to Support Clinical Analysis closely examines the privacy threats that may arise from medical data sharing, and surveys the state-of-the-art methods developed to safeguard data against these threats. To motivate the need for computational methods, the book first explores the main challenges facing the privacy-protection of medical data using the existing policies, practices and regulations. Then, it takes an in-depth look at the popular computational privacy-preserving methods that have been developed for demographic, clinical and genomic data sharing, and closely analyzes the privacy principles behind these methods, as well as the optimization and algorithmic strategies that they employ. Finally, through a series of in-depth case studies that highlight data from the US Census as well as the Vanderbilt University Medical Center, the book outlines a new, innovative class of privacy-preserving methods designed to ensure the integrity of transferred medical data for subsequent analysis, such as discovering or validating associations between clinical and genomic information. Anonymization of Electronic Medical Records to Support Clinical Analysis is intended for professionals as a reference guide for safeguarding the privacy and data integrity of sensitive medical records. Academics and other research scientists will also find the book invaluable.
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Joint Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2012, held in Vilamoura, Portugal, in February 2012. The 26 revised full papers presented together with one invited lecture were carefully reviewed and selected from a total of 522 submissions. The papers cover a wide range of topics and are organized in four general topical sections on biomedical electronics and devices; bioinformatics models, methods and algorithms; bio-inspired systems and signal processing; health informatics.
This book constitutes the refereed proceedings of the Second International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2012, held in Shanghai, China, in September 2012. The 60 full papers presented were carefully reviewed and selected from numerous submissions and present theories and methodologies as well as the emerging applications of intelligent computing in sustainable energy and environment.
The four-volume set LNCS 7333-7336 constitutes the refereed proceedings of the 12th International Conference on Computational Science and Its Applications, ICCSA 2012, held in Salvador de Bahia, Brazil, in June 2012. The four volumes contain papers presented in the following workshops: 7333 - advances in high performance algorithms and applications (AHPAA); bioinspired computing and applications (BIOCA); computational geometry and applicatons (CGA); chemistry and materials sciences and technologies (CMST); cities, technologies and planning (CTP); 7334 - econometrics and multidimensional evaluation in the urban environment (EMEUE); geographical analysis, urban modeling, spatial statistics (Geo-An-Mod); 7335 - optimization techniques and applications (OTA); mobile communications (MC); mobile-computing, sensind and actuation for cyber physical systems (MSA4CPS); remote sensing (RS); 7336 - software engineering processes and applications (SEPA); software quality (SQ); security and privacy in computational sciences (SPCS); soft computing and data engineering (SCDE). The topics of the fully refereed papers are structured according to the four major conference themes: 7333 - computational methods, algorithms and scientific application; 7334 - geometric modelling, graphics and visualization; 7335 - information systems and technologies; 7336 - high performance computing and networks.
This book constitutes the proceedings of the 5th International Conference on Knowledge Science, Engineering and Management, KSEM 2011, held in Irvine, CA, USA, in December 2011. The 34 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. |
You may like...
International Labour Migration in the…
Kwen Fee Lian, Naomi Hosoda, …
Hardcover
R1,756
Discovery Miles 17 560
|