0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (6)
  • R250 - R500 (59)
  • R500+ (5,338)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > Data structures

Matrix and Tensor Factorization Techniques for Recommender Systems (Paperback, 1st ed. 2016): Panagiotis Symeonidis, Andreas... Matrix and Tensor Factorization Techniques for Recommender Systems (Paperback, 1st ed. 2016)
Panagiotis Symeonidis, Andreas Zioupos
R2,325 Discovery Miles 23 250 Ships in 18 - 22 working days

This book presents the algorithms used to provide recommendations by exploiting matrix factorization and tensor decomposition techniques. It highlights well-known decomposition methods for recommender systems, such as Singular Value Decomposition (SVD), UV-decomposition, Non-negative Matrix Factorization (NMF), etc. and describes in detail the pros and cons of each method for matrices and tensors. This book provides a detailed theoretical mathematical background of matrix/tensor factorization techniques and a step-by-step analysis of each method on the basis of an integrated toy example that runs throughout all its chapters and helps the reader to understand the key differences among methods. It also contains two chapters, where different matrix and tensor methods are compared experimentally on real data sets, such as Epinions, GeoSocialRec, Last.fm, BibSonomy, etc. and provides further insights into the advantages and disadvantages of each method. The book offers a rich blend of theory and practice, making it suitable for students, researchers and practitioners interested in both recommenders and factorization methods. Lecturers can also use it for classes on data mining, recommender systems and dimensionality reduction methods.

Programming in HTML and PHP - Coding for Scientists and Engineers (Paperback, 1st ed. 2017): David R. Brooks Programming in HTML and PHP - Coding for Scientists and Engineers (Paperback, 1st ed. 2017)
David R. Brooks
R2,627 Discovery Miles 26 270 Ships in 18 - 22 working days

This concise and accessible textbook will enable readers to quickly develop the working skills necessary to solve computational problems in a server-based environment, using HTML and PHP. The importance of learning by example (as opposed to simply learning by copying) is emphasized through extensive use of hands-on exercises and examples, with a specific focus on useful science and engineering applications. The clearly-written text is designed to be simple to follow for the novice student, without requiring any background in programming or mathematics beyond algebra. Topics and features: describes the creation of HTML pages and the characteristics of HTML documents, showing how to use HTML tables, forms, lists, and frames to organize documents for use with PHP applications; explains how to set up a PHP environment, using a local or remote server; introduces the capabilities and syntax of the PHP language, including coverage of array syntax and use; examines user-defined functions in programming, summarizing PHP functions for reading and writing files, viewing the content of variables, and manipulating strings; reviews the PHP GD graphics library, presenting applications for creating pie charts, bar graphs, and line graphs suitable for displaying scientific data; includes appendices listing HTML and ASCII special characters, and highlighting the essential basic strategies for solving computational problems. Supplying all of the tools necessary to begin coding in HTML and PHP, this invaluable textbook is ideal for undergraduate students taking introductory courses in programming. The book will also serve as a helpful self-study text for professionals in any technical field.

Metaheuristic Applications to Speech Enhancement (Paperback, 1st ed. 2016): Prajna Kunche, K. V. V. S. Reddy Metaheuristic Applications to Speech Enhancement (Paperback, 1st ed. 2016)
Prajna Kunche, K. V. V. S. Reddy
R1,709 Discovery Miles 17 090 Ships in 18 - 22 working days

This book serves as a basic reference for those interested in the application of metaheuristics to speech enhancement. The major goal of the book is to explain the basic concepts of optimization methods and their use in heuristic optimization in speech enhancement to scientists, practicing engineers, and academic researchers in speech processing. The authors discuss why it has been a challenging problem for researchers to develop new enhancement algorithms that aid in the quality and intelligibility of degraded speech. They present powerful optimization methods to speech enhancement that can help to solve the noise reduction problems. Readers will be able to understand the fundamentals of speech processing as well as the optimization techniques, how the speech enhancement algorithms are implemented by utilizing optimization methods, and will be given the tools to develop new algorithms. The authors also provide a comprehensive literature survey regarding the topic.

Handbook of Finite State Based Models and Applications (Hardcover, New): Jiacun Wang Handbook of Finite State Based Models and Applications (Hardcover, New)
Jiacun Wang
R4,995 Discovery Miles 49 950 Ships in 18 - 22 working days

Applicable to any problem that requires a finite number of solutions, finite state-based models (also called finite state machines or finite state automata) have found wide use in various areas of computer science and engineering. Handbook of Finite State Based Models and Applications provides a complete collection of introductory materials on finite state theories, algorithms, and the latest domain applications. For beginners, the book is a handy reference for quickly looking up model details. For more experienced researchers, it is suitable as a source of in-depth study in this area.

The book first introduces the fundamentals of automata theory, including regular expressions, as well as widely used automata, such as transducers, tree automata, quantum automata, and timed automata. It then presents algorithms for the minimization and incremental construction of finite automata and describes Esterel, an automata-based synchronous programming language for embedded system software development.

Moving on to applications, the book explores regular path queries on graph-structured data, timed automata in model checking security protocols, pattern matching, compiler design, and XML processing. It also covers other finite state-based modeling approaches and applications, including Petri nets, statecharts, temporal logic, and UML state machine diagrams.

Verifiable Privacy Protection for Vehicular Communication Systems (Paperback, 1st ed. 2017): David Foerster Verifiable Privacy Protection for Vehicular Communication Systems (Paperback, 1st ed. 2017)
David Foerster
R1,734 Discovery Miles 17 340 Ships in 18 - 22 working days

David Foerster examines privacy protection for vehicular communication under the assumption of an attacker that is able to compromise back-end systems - motivated by the large number of recent security incidents and revelations about mass surveillance. The author aims for verifiable privacy protection enforced through cryptographic and technical means, which safeguards user data even if back-end systems are not fully trusted. Foerster applies advanced cryptographic concepts, such as anonymous credentials, and introduces a novel decentralized secret sharing algorithm to fulfill complex and seemingly contradicting requirements in several vehicle-to-x application scenarios. Many of the concepts and results can also be applied to other flavors of internet of things systems.

Text Mining with Machine Learning - Principles and Techniques (Hardcover): Jan Zizka, Frantisek Darena, Arnost Svoboda Text Mining with Machine Learning - Principles and Techniques (Hardcover)
Jan Zizka, Frantisek Darena, Arnost Svoboda
R5,081 Discovery Miles 50 810 Ships in 10 - 15 working days

This book provides a perspective on the application of machine learning-based methods in knowledge discovery from natural languages texts. By analysing various data sets, conclusions which are not normally evident, emerge and can be used for various purposes and applications. The book provides explanations of principles of time-proven machine learning algorithms applied in text mining together with step-by-step demonstrations of how to reveal the semantic contents in real-world datasets using the popular R-language with its implemented machine learning algorithms. The book is not only aimed at IT specialists, but is meant for a wider audience that needs to process big sets of text documents and has basic knowledge of the subject, e.g. e-mail service providers, online shoppers, librarians, etc. The book starts with an introduction to text-based natural language data processing and its goals and problems. It focuses on machine learning, presenting various algorithms with their use and possibilities, and reviews the positives and negatives. Beginning with the initial data pre-processing, a reader can follow the steps provided in the R-language including the subsuming of various available plug-ins into the resulting software tool. A big advantage is that R also contains many libraries implementing machine learning algorithms, so a reader can concentrate on the principal target without the need to implement the details of the algorithms her- or himself. To make sense of the results, the book also provides explanations of the algorithms, which supports the final evaluation and interpretation of the results. The examples are demonstrated using realworld data from commonly accessible Internet sources.

Context-Aware Systems and Applications - 5th International Conference, ICCASA 2016, Thu Dau Mot, Vietnam, November 24-25, 2016,... Context-Aware Systems and Applications - 5th International Conference, ICCASA 2016, Thu Dau Mot, Vietnam, November 24-25, 2016, Proceedings (Paperback, 1st ed. 2017)
Phan Cong-Vinh, Le Tuan Anh, Nguyen Thi Thuy Loan, Waralak Vongdoiwang Siricharoen
R1,941 Discovery Miles 19 410 Ships in 18 - 22 working days

This book constitutes the proceedings of the 5th International Conference on Context-Aware Systems and Applications, ICCASA 2016, held in Thu Dau Mot, Vietnam, in November 2016. The 22 revised full papers presented were carefully selected from 35 submissions and cover a wide spectrum in the area of Context-Aware-Systems (CAS). CAS is characterized by its self- facets such as self-organization, self-configuration, self-healing, self-optimization, self-protection, where context awareness used to dynamically control computing and networking functions. The overall goal of CAS is to realize nature-inspired autonomic systems that can manage themselves without direct human interventions.

Approximation and Online Algorithms - 13th International Workshop, WAOA 2015, Patras, Greece, September 17-18, 2015. Revised... Approximation and Online Algorithms - 13th International Workshop, WAOA 2015, Patras, Greece, September 17-18, 2015. Revised Selected Papers (Paperback, 1st ed. 2015)
Laura Sanita, Martin Skutella
R1,941 Discovery Miles 19 410 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Approximation and Online Algorithms, WAOA 2015, held in Patras, Greece, in September 2015 as part of ALGO 2015. The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Topics of interest for WAOA 2015 were: algorithmic game theory, algorithmic trading, coloring and partitioning, competitive analysis, computational advertising, computational finance, cuts and connectivity, geometric problems, graph algorithms, inapproximability, mechanism design, natural algorithms, network design, packing and covering, paradigms for the design and analysis of approximation and online algorithms, parameterized complexity, scheduling problems,and real-world applications.

A Polynomial Translation of Mobile Ambients into Safe Petri Nets - Understanding a Calculus of Hierarchical Protection Domains... A Polynomial Translation of Mobile Ambients into Safe Petri Nets - Understanding a Calculus of Hierarchical Protection Domains (Paperback, 1st ed. 2016)
Susanne Goebel
R1,526 Discovery Miles 15 260 Ships in 18 - 22 working days

The master thesis of Susanne Goebel generates the deep understanding of the Mobile Ambient (MA) calculus that is necessary to use it as a modeling language. Instead of calculus terms a much more convenient representation via MA trees naturally maps to the application area of networks where processes pass hierarchical protection domains like firewalls. The work analyses MA's function principles and derives a translation into Safe Petri nets. It extends to arbitrary MA processes but finiteness of the net and therefore decidability of reachability is only guaranteed for bounded processes. The construction is polynomial in process size and bounds so that reachability analysis is only PSPACE-complete.

Tools and Algorithms for the Construction and Analysis of Systems - 23rd International Conference, TACAS 2017, Held as Part of... Tools and Algorithms for the Construction and Analysis of Systems - 23rd International Conference, TACAS 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Axel Legay, Tiziana Margaria
R3,041 Discovery Miles 30 410 Ships in 18 - 22 working days

The two-book set LNCS 10205 + 10206 constitutes the proceedings of the 23rd International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2017, which took place in Uppsala, Sweden in April 2017, held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017.The 48 full papers, 4 tool demonstration papers, and 12 software competition papers presented in these volumes were carefully reviewed and selected from 181 submissions to TACAS and 32 submissions to the software competition. They were organized in topical sections named: verification techniques; learning; synthesis; automata; concurrency and bisimulation; hybrid systems; security; run-time verification and logic; quantitative systems; SAT and SMT; and SV COMP.

Supercomputing - Second Russian Supercomputing Days, RuSCDays 2016, Moscow, Russia, September 26-27, 2016, Revised Selected... Supercomputing - Second Russian Supercomputing Days, RuSCDays 2016, Moscow, Russia, September 26-27, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Vladimir Voevodin, Sergey Sobolev
R2,386 Discovery Miles 23 860 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second Russian Supercomputing Days, RuSCDays 2016, held in Moscow, Russia, in September 2016. The 28 revised full papers presented were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on the present of supercomputing: large tasks solving experience; the future of supercomputing: new technologies.

Software Engineering and Formal Methods - SEFM 2015 Collocated Workshops: ATSE, HOFM, MoKMaSD, and VERY*SCART, York, UK,... Software Engineering and Formal Methods - SEFM 2015 Collocated Workshops: ATSE, HOFM, MoKMaSD, and VERY*SCART, York, UK, September 7-8, 2015. Revised Selected Papers (Paperback, 1st ed. 2015)
Domenico Bianculli, Radu Calinescu, Bernhard Rumpe
R2,301 Discovery Miles 23 010 Ships in 18 - 22 working days

This book constitutes revised selected papers from the workshopscollocated with the SEFM 2015 conference on Software Engineering andFormal Methods, held in York, UK, in September 2015.The 25 papers included in this volume were carefully reviewed and selected from 32 submissions. The satellite workshops provided a highly interactive and collaborative environment for researchers and practitioners from industry and academia to discuss emerging areas of software engineering and formal methods.The four workshops were: ATSE 2015: The 6th Workshop on Automating Test Case Design, Selection and Evaluation; HOFM 2015: The 2nd Human-Oriented Formal Methods Workshop; MoKMaSD 2015: The 4th International Symposium on Modelling and Knowledge Management Applications: Systems and Domains; VERY*SCART 2015: The 1st International Workshop on the Art of Service Composition and Formal Verification for Self-* Systems.

Graph-Theoretic Concepts in Computer Science - 42nd International Workshop, WG 2016, Istanbul, Turkey, June 22-24, 2016,... Graph-Theoretic Concepts in Computer Science - 42nd International Workshop, WG 2016, Istanbul, Turkey, June 22-24, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Pinar Heggernes
R2,206 Discovery Miles 22 060 Ships in 18 - 22 working days

This book constitutes revised selected papers from the 42nd International Workshop on Graph-Theoretic Concepts in Computer Science, WG 2016, held in Istanbul, Turkey, in June 2016. The 25 papers presented in this volume were carefully reviewed and selected from 74 submissions.The WG conferences aim to connect theory and practice by demonstrating how graph-theoretic concepts can be applied to various areas of computer science and by extracting new graph problems from applications. Their goal is to present new research results and to identify and explore directions of future research.

Hyper-lattice Algebraic Model for Data Warehousing (Paperback, 1st ed. 2016): Soumya Sen, Agostino Cortesi, Nabendu Chaki Hyper-lattice Algebraic Model for Data Warehousing (Paperback, 1st ed. 2016)
Soumya Sen, Agostino Cortesi, Nabendu Chaki
R1,561 Discovery Miles 15 610 Ships in 18 - 22 working days

This book presents Hyper-lattice, a new algebraic model for partially ordered sets, and an alternative to lattice. The authors analyze some of the shortcomings of conventional lattice structure and propose a novel algebraic structure in the form of Hyper-lattice to overcome problems with lattice. They establish how Hyper-lattice supports dynamic insertion of elements in a partial order set with a partial hierarchy between the set members. The authors present the characteristics and the different properties, showing how propositions and lemmas formalize Hyper-lattice as a new algebraic structure.

Optimization of Stochastic Discrete Systems and Control on Complex Networks - Computational Networks (Paperback, Softcover... Optimization of Stochastic Discrete Systems and Control on Complex Networks - Computational Networks (Paperback, Softcover reprint of the original 1st ed. 2015)
Dmitrii Lozovanu, Stefan Pickl
R2,688 Discovery Miles 26 880 Ships in 18 - 22 working days

This book presents the latest findings on stochastic dynamic programming models and on solving optimal control problems in networks. It includes the authors' new findings on determining the optimal solution of discrete optimal control problems in networks and on solving game variants of Markov decision problems in the context of computational networks. First, the book studies the finite state space of Markov processes and reviews the existing methods and algorithms for determining the main characteristics in Markov chains, before proposing new approaches based on dynamic programming and combinatorial methods. Chapter two is dedicated to infinite horizon stochastic discrete optimal control models and Markov decision problems with average and expected total discounted optimization criteria, while Chapter three develops a special game-theoretical approach to Markov decision processes and stochastic discrete optimal control problems. In closing, the book's final chapter is devoted to finite horizon stochastic control problems and Markov decision processes. The algorithms developed represent a valuable contribution to the important field of computational network theory.

Frontiers of Higher Order Fuzzy Sets (Paperback, Softcover reprint of the original 1st ed. 2015): Alireza Sadeghian, Hooman... Frontiers of Higher Order Fuzzy Sets (Paperback, Softcover reprint of the original 1st ed. 2015)
Alireza Sadeghian, Hooman Tahayori
R3,335 Discovery Miles 33 350 Ships in 18 - 22 working days

Frontiers of Higher Order Fuzzy Sets, provides a unified representation theorem for higher order fuzzy sets. The book elaborates on the concept of gradual elements and their integration with the higher order fuzzy sets. This book also is devoted to the introduction of new frameworks based on general T2FSs, IT2FSs, Gradual elements, Shadowed sets and rough sets. Such new frameworks will provide more capable frameworks for real applications. Applications of higher order fuzzy sets in various fields will be discussed. In particular, the properties and characteristics of the new proposed frameworks would be studied. Such frameworks that are the result of the integration of general T2FSs, IT2FSs, gradual elements, shadowed sets and rough sets will be shown to be suitable to be applied in the fields of bioinformatics, business, management, ambient intelligence, medicine, cloud computing and smart grids.

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIX (Paperback, 1st ed. 2016): Abdelkader Hameurlain, Josef... Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIX (Paperback, 1st ed. 2016)
Abdelkader Hameurlain, Josef Kung, Roland Wagner
R1,741 Discovery Miles 17 410 Ships in 18 - 22 working days

The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between grids, P2P systems, and agent technologies is the key to data- and knowledge-centered systems in large-scale environments. This, the 29th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains four revised selected regular papers. Topics covered include optimization and cluster validation processes for entity matching, business intelligence systems, and data profiling in the Semantic Web.

Secure Smart Embedded Devices, Platforms and Applications (Paperback, Softcover reprint of the original 1st ed. 2014):... Secure Smart Embedded Devices, Platforms and Applications (Paperback, Softcover reprint of the original 1st ed. 2014)
Konstantinos Markantonakis, Keith Mayes
R7,435 Discovery Miles 74 350 Ships in 18 - 22 working days

New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and considerations, while focusing strongly on technical and practical security issues. The benefits and pitfalls of developing and deploying applications that rely on embedded systems and their security functionality are presented. A sufficient level of technical detail to support embedded systems is provided throughout the text, although the book is quite readable for those seeking awareness through an initial overview of the topics. This edited volume benefits from the contributions of industry and academic experts and helps provide a cross-discipline overview of the security and practical issues for embedded systems, tokens, and platforms. It is an ideal complement to the earlier work, Smart Cards Tokens, Security and Applications from the same editors.

Clustering High--Dimensional Data - First International Workshop, CHDD 2012, Naples, Italy, May 15, 2012, Revised Selected... Clustering High--Dimensional Data - First International Workshop, CHDD 2012, Naples, Italy, May 15, 2012, Revised Selected Papers (Paperback, 1st ed. 2015)
Francesco Masulli, Alfredo Petrosino, Stefano Rovetta
R1,556 Discovery Miles 15 560 Ships in 18 - 22 working days

This book constitutes the proceedings of the International Workshop on Clustering High-Dimensional Data, CHDD 2012, held in Naples, Italy, in May 2012. The 9 papers presented in this volume were carefully reviewed and selected from 15 submissions. They deal with the general subject and issues of high-dimensional data clustering; present examples of techniques used to find and investigate clusters in high dimensionality; and the most common approach to tackle dimensionality problems, namely, dimensionality reduction and its application in clustering.

IT Security Risk Management in the Context of Cloud Computing - Towards an Understanding of the Key Role of Providers' IT... IT Security Risk Management in the Context of Cloud Computing - Towards an Understanding of the Key Role of Providers' IT Security Risk Perceptions (Paperback, 1st ed. 2015)
Andre Loske
R1,788 Discovery Miles 17 880 Ships in 18 - 22 working days

This work adds a new perspective to the stream of organizational IT security risk management literature, one that sheds light on the importance of IT security risk perceptions. Based on a large-scale empirical study of Cloud providers located in North America, the study reveals that in many cases, the providers' decision makers significantly underestimate their services' IT security risk exposure, which inhibits the implementation of necessary safeguarding measures. The work also demonstrates that even though the prevalence of IT security risk concerns in Cloud adoption is widely recognized, providers only pay very limited attention to the concerns expressed by customers, which not only causes serious disagreements with the customers but also considerably inhibits the adoption of the services.

Genetic Algorithms in Java Basics (Paperback, 1st ed.): Lee Jacobson, Burak Kanber Genetic Algorithms in Java Basics (Paperback, 1st ed.)
Lee Jacobson, Burak Kanber
R1,928 Discovery Miles 19 280 Ships in 18 - 22 working days

Genetic Algorithms in Java Basics is a brief introduction to solving problems using genetic algorithms, with working projects and solutions written in the Java programming language. This brief book will guide you step-by-step through various implementations of genetic algorithms and some of their common applications, with the aim to give you a practical understanding allowing you to solve your own unique, individual problems. After reading this book you will be comfortable with the language specific issues and concepts involved with genetic algorithms and you'll have everything you need to start building your own. Genetic algorithms are frequently used to solve highly complex real world problems and with this book you too can harness their problem solving capabilities. Understanding how to utilize and implement genetic algorithms is an essential tool in any respected software developers toolkit. So step into this intriguing topic and learn how you too can improve your software with genetic algorithms, and see real Java code at work which you can develop further for your own projects and research. Guides you through the theory behind genetic algorithms Explains how genetic algorithms can be used for software developers trying to solve a range of problems Provides a step-by-step guide to implementing genetic algorithms in Java

Basic Prediction Techniques in Modern Video Coding Standards (Paperback, 1st ed. 2016): Byung-gyu Kim, Kalyan Goswami Basic Prediction Techniques in Modern Video Coding Standards (Paperback, 1st ed. 2016)
Byung-gyu Kim, Kalyan Goswami
R1,603 Discovery Miles 16 030 Ships in 18 - 22 working days

This book discusses in detail the basic algorithms of video compression that are widely used in modern video codec. The authors dissect complicated specifications and present material in a way that gets readers quickly up to speed by describing video compression algorithms succinctly, without going to the mathematical details and technical specifications. For accelerated learning, hybrid codec structure, inter- and intra- prediction techniques in MPEG-4, H.264/AVC, and HEVC are discussed together. In addition, the latest research in the fast encoder design for the HEVC and H.264/AVC is also included.

Machine Translation - 12th China Workshop, CWMT 2016, Urumqi, China, August 25-26, 2016, Revised Selected Papers (Paperback,... Machine Translation - 12th China Workshop, CWMT 2016, Urumqi, China, August 25-26, 2016, Revised Selected Papers (Paperback, 1st ed. 2016)
Muyun Yang, Shujie Liu
R1,730 Discovery Miles 17 300 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th China Workshop on Machine Translation, CWMT 2016, held in Urumqi, China, in August 2016. The 10 English papers presented in this volume were carefully reviewed and selected from 76 submissions. They deal with statistical machine translation, hybrid machine translation, machine translation evaluation, post editing, alignment, and inducing bilingual knowledge from corpora.

Mathematical Foundations of Computer Science 2015 - 40th International Symposium, MFCS 2015, Milan, Italy, August 24-28, 2015,... Mathematical Foundations of Computer Science 2015 - 40th International Symposium, MFCS 2015, Milan, Italy, August 24-28, 2015, Proceedings, Part I (Paperback, 1st ed. 2015)
Giuseppe F. Italiano, Giovanni Pighizzini, Donald T Sannella
R2,650 Discovery Miles 26 500 Ships in 18 - 22 working days

This two volume set LNCS 9234 and 9235 constitutes the refereed conference proceedings of the 40th International Symposium on Mathematical Foundations of Computer Science, MFCS 2015, held in Milan, Italy, in August 2015. The 82 revised full papers presented together with 5 invited talks were carefully selected from 201 submissions. The papers feature high-quality research in all branches of theoretical computer science. They have been organized in the following topical main sections: logic, semantics, automata, and theory of programming (volume 1) and algorithms, complexity, and games (volume 2).

Harmony Search Algorithm - Proceedings of the 2nd International Conference on Harmony Search Algorithm (ICHSA2015) (Paperback,... Harmony Search Algorithm - Proceedings of the 2nd International Conference on Harmony Search Algorithm (ICHSA2015) (Paperback, 1st ed. 2016)
Joong Hoon Kim, Zong Woo Geem
R6,375 Discovery Miles 63 750 Ships in 18 - 22 working days

The Harmony Search Algorithm (HSA) is one of the most well-known techniques in the field of soft computing, an important paradigm in the science and engineering community. This volume, the proceedings of the 2nd International Conference on Harmony Search Algorithm 2015 (ICHSA 2015), brings together contributions describing the latest developments in the field of soft computing with a special focus on HSA techniques. It includes coverage of new methods that have potentially immense application in various fields. Contributed articles cover aspects of the following topics related to the Harmony Search Algorithm: analytical studies; improved, hybrid and multi-objective variants; parameter tuning; and large-scale applications. The book also contains papers discussing recent advances on the following topics: genetic algorithms; evolutionary strategies; the firefly algorithm and cuckoo search; particle swarm optimization and ant colony optimization; simulated annealing; and local search techniques. This book offers a valuable snapshot of the current status of the Harmony Search Algorithm and related techniques, and will be a useful reference for practising researchers and advanced students in computer science and engineering.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Introduction to Chemical Engineering…
Henry C. Foley Paperback R3,120 Discovery Miles 31 200
Comprehensive Metaheuristics…
S. Ali Mirjalili, Amir Hossein Gandomi Paperback R3,956 Discovery Miles 39 560
The Application of Ant Colony…
Ali Soofastaei Hardcover R2,553 Discovery Miles 25 530
MATLAB Applications in Engineering
Constantin Volosencu Hardcover R3,055 Discovery Miles 30 550
Genetic Algorithms with Python
Clinton Sheppard Hardcover R856 R812 Discovery Miles 8 120
Coding for Kids in Python - Python…
Bob Mather Hardcover R851 Discovery Miles 8 510
Python Programming for Computations…
Computer Language Hardcover R1,120 R949 Discovery Miles 9 490
Reachable Sets of Dynamic Systems…
Stanislaw Raczynski Paperback R3,927 Discovery Miles 39 270
Gamma Solution - An Application of…
James R Warren Hardcover R1,232 R1,048 Discovery Miles 10 480
C Programming - C Programming Language…
Adam Dodson Hardcover R551 R505 Discovery Miles 5 050

 

Partners