![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > Data structures
This book constitutes the refereed proceedings of the 12th International Conference on Graph Transformation, ICGT 2019, held as part of STAF 2019, in Eindhoven, The Netherlands, in July2019. The 12 research papers and 1 tool paper presented in this book were carefully reviewed and selected from 22 submissions. The papers deal with the following topics: Theory, Analysis and Verification, Tools and Applications, and Transformation Rules Construction and Matching.
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics VII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Techniques, Fraud and Malware Investigations, Network Forensics, and Advanced Forensic Techniques. This book is the 7th volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of 21 edited papers from the 7th Annual IFIP WG 11.9 International Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2011. Advances in Digital Forensics VII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.
This two-volume set (LNAI 11055 and LNAI 11056) constitutes the refereed proceedings of the 10th International Conference on Collective Intelligence, ICCCI 2018, held in Bristol, UK, in September 2018 The 98 full papers presented were carefully reviewed and selected from 240 submissions. The conference focuses on knowledge engineering and semantic web, social network analysis, recommendation methods and recommender systems, agents and multi-agent systems, text processing and information retrieval, data mining methods and applications, decision support and control systems, sensor networks and internet of things, as well as computer vision techniques.
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-edge research and innovative findings from leading researchers. The characteristic feature of all the contributions in this book is their relevance for the practical application of security principles to a variety of widely used communication techniques, including: multiantenna systems, ultra-wide-band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, building a bridge between two usually distinct worlds. The book gathers extended versions of contributions delivered at the Second Workshop on Communication Security, held in Paris, France, in April 2017 and affiliated with the conference EUROCRYPT 2017.
This two-volume set (LNAI 11055 and LNAI 11056) constitutes the refereed proceedings of the 10th International Conference on Collective Intelligence, ICCCI 2018, held in Bristol, UK, in September 2018 The 98 full papers presented were carefully reviewed and selected from 240 submissions. The conference focuses on knowledge engineering and semantic web, social network analysis, recommendation methods and recommender systems, agents and multi-agent systems, text processing and information retrieval, data mining methods and applications, decision support and control systems, sensor networks and internet of things, as well as computer vision techniques.
This book constitutes the refereed joint proceedings of the First International Workshop on Data Driven Treatment Response Assessment, DATRA 2018 and the Third International Workshop on Preterm, Perinatal and Paediatric Image Analysis, PIPPI 2018, held in conjunction with the 21st International Conference on Medical Imaging and Computer-Assisted Intervention, MICCAI 2018, in Granada, Spain, in September 2018. The 5 full papers presented at DATRA 2018 and the 12 full papers presented at PIPPI 2018 were carefully reviewed and selected. The DATRA papers cover a wide range of exploring pattern recognition technologies for tackling clinical issues related to the follow-up analysis of medical data with focus on malignancy progression analysis, computer-aided models of treatment response, and anomaly detection in recovery feedback. The PIPPI papers cover topics of advanced image analysis approaches focused on the analysis of growth and development in the fetal, infant and paediatric period.
This book constitutes the proceedings of the Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition, S+SSPR 2018, held in Beijing, China, in August 2018. The 49 papers presented in this volume were carefully reviewed and selected from 75 submissions. They were organized in topical sections named: classification and clustering; deep learning and neurla networks; dissimilarity representations and Gaussian processes; semi and fully supervised learning methods; spatio-temporal pattern recognition and shape analysis; structural matching; multimedia analysis and understanding; and graph-theoretic methods.
This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.
The volume on Data Management, Analytics and Innovations presents the latest high-quality technical contributions and research results in the areas of data management and smart computing, big data management, artificial intelligence and data analytics along with advances in network technologies. It deals with the state-of-the-art topics and provides challenges and solutions for future development. Original, unpublished research work highlighting specific research domains from all viewpoints are contributed from scientists throughout the globe. This volume is mainly designed for professional audience, composed of researchers and practitioners in academia and industry.
This two-volume set (CCIS 873 and CCIS 874) constitutes the thoroughly refereed proceedings of the 9th International Symposium, ISICA 2017, held in Guangzhou, China, in November 2017.The 101 full papers presented in both volumes were carefully reviewed and selected from 181 submissions. This first volume is organized in topical sections on neural networks and statistical learning: neural architecture search, transfer of knowledge; evolutionary multi-objective and dynamic optimization: optimal control and design, hybrid methods; data mining: association rule learning, data management platforms; Cloud computing and multiagent systems: service models, Cloud engineering; everywhere connectivity: IoT solutions, wireless sensor networks.
This book aims to provide a general overview of heuristic search, to present the basic steps of the most popular heuristics, and to stress their hidden difficulties as well as their opportunities. It provides a comprehensive understanding of Heuristic search, the applications of which are now widely used in a variety of industries including engineering, finance, sport, management and medicine. It intends to aid researchers and practitioners in solving complex combinatorial and global optimisation problems, and spark interest in this exciting decision science-based subject. It will provide the reader with challenging and lively methodologies through which they will be able to design and analyse their own techniques
This two-volume set (CCIS 873 and CCIS 874) constitutes the thoroughly refereed proceedings of the 9th International Symposium, ISICA 2017, held in Guangzhou, China, in November 2017. The 101 full papers presented in both volumes were carefully reviewed and selected from 181 submissions. This second volume is organized in topical sections on swarm intelligence: cooperative Search, swarm optimization; complex systems modeling: system dynamic, multimedia simulation; intelligent information systems: information retrieval, e-commerce platforms; artificial intelligence and robotics: query optimization, intelligent engineering; virtualization: motion-based tracking, image recognition.
This book constitutes the proceedings of the 40th International Conference on Application and Theory of Petri Nets and Concurrency, PETRI NETS 2019, held in Aachen, Germany, , in June 2018. Petri Nets 2019 is co-located with the 19th International Conference on Application of Concurrency to System Design, ACSD 2019. The 23 regular and 3 invited papers presented together in this volume were carefully reviewed and selected from 41 submissions. The focus of the conference is on following topics: Models, Tools, Synthesis, Semantics, Concurrent Processes, Algorithmic Aspects, Parametrics and Combinatorics, and Models with Extensions.
This book constitutes the thoroughly refereed proceedings of the 7th International Conference on Mathematics and Computation in Music, MCM 2019, held in Madrid, Spain, in June 2019. The 22 full papers and 10 short papers presented were carefully reviewed and selected from 48 submissions. The papers feature research that combines mathematics or computation with music theory, music analysis, composition, and performance. They are organized in topical sections on algebraic and other abstract mathematical approaches to understanding musical objects; remanaging Riemann: mathematical music theory as "experimental philosophy"?; octave division; computer-based approaches to composition and score structuring; models for music cognition and beat tracking; pedagogy of mathematical music theory. The chapter "Distant Neighbors and Interscalar Contiguities" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This is a book about numbers and how those numbers are represented in and operated on by computers. It is crucial that developers understand this area because the numerical operations allowed by computers, and the limitations of those operations, especially in the area of floating point math, affect virtually everything people try to do with computers. This book aims to fill this gap by exploring, in sufficient but not overwhelming detail, just what it is that computers do with numbers. Divided into two parts, the first deals with standard representations of integers and floating point numbers, while the second examines several other number representations. Details are explained thoroughly, with clarity and specificity. Each chapter ends with a summary, recommendations, carefully selected references, and exercises to review the key points. Topics covered include interval arithmetic, fixed-point numbers, big integers and rational arithmetic. This new edition has three new chapters: Pitfalls of Floating-Point Numbers (and How to Avoid Them), Arbitrary Precision Floating Point, and Other Number Systems. This book is for anyone who develops software including software engineers, scientists, computer science students, engineering students and anyone who programs for fun.
This book constitutes the refereed proceedings of the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, held in Bogota, Colombia in June 2019. The 29 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers were organized in topical sections named: integrity and cryptanalysis; digital signature and MAC; software and systems security; blockchain and cryptocurrency; post quantum cryptography; public key and commitment; theory of cryptographic implementations; and privacy preserving techniques.
These contributions, written by the foremost international researchers and practitioners of Genetic Programming (GP), explore the synergy between theoretical and empirical results on real-world problems, producing a comprehensive view of the state of the art in GP. Topics in this volume include: multi-objective genetic programming, learning heuristics, Kaizen programming, Evolution of Everything (EvE), lexicase selection, behavioral program synthesis, symbolic regression with noisy training data, graph databases, and multidimensional clustering. It also covers several chapters on best practices and lesson learned from hands-on experience. Additional application areas include financial operations, genetic analysis, and predicting product choice. Readers will discover large-scale, real-world applications of GP to a variety of problem domains via in-depth presentations of the latest and most significant results.
This two-volume set LNCS 10954 and LNCS 10955 constitutes - in conjunction with the volume LNAI 10956 - the refereed proceedings of the 14th International Conference on Intelligent Computing, ICIC 2018, held in Wuhan, China, in August 2018. The 275 full papers and 72 short papers of the three proceedings volumes were carefully reviewed and selected from 632 submissions. The papers are organized in topical sections such as Neural Networks.- Pattern Recognition.- Image Processing.- Intelligent Computing in Robotics.- Intelligent Control and Automation.- Intelligent Data Analysis and Prediction.- Fuzzy Theory and Algorithms.- Supervised Learning.- Unsupervised Learning.- Kernel Methods and Supporting Vector Machines.- Knowledge Discovery and Data Mining.- Natural Language Processing and Computational Linguistics.- Gene Expression Array Analysis.- Systems Biology.- Computational Genomics.- Computational Proteomics.- Gene Regulation Modeling and Analysis.- Protein-Protein Interaction Prediction.- Next-Gen Sequencing and Metagenomics.- Structure Prediction and Folding.- Evolutionary Optimization for Scheduling.- High-Throughput Biomedical Data Integration and Mining.- Machine Learning Algorithms and Applications.- Heuristic Optimization Algorithms for Real-World Applications.- Evolutionary Multi-Objective Optimization and Its Applications.- Swarm Evolutionary Algorithms for Scheduling and Combinatorial.- Optimization.- Swarm Intelligence and Applications in Combinatorial Optimization.- Advances in Metaheuristic Optimization Algorithm.- Advances in Image Processing and Pattern Recognition Techniques.- AI in Biomedicine.- Bioinformatics.- Biometrics Recognition.- Information Security.- Virtual Reality and Human-Computer Interaction.- Healthcare Informatics Theory and Methods.- Intelligent Computing in Computer Vision.- Intelligent Agent and Web Applications.- Reinforcement Learning.- Machine Learning.- Modeling, Simulation, and Optimization of Biological Systems.- Biomedical Data Modeling and Mining.- Cheminformatics.- Intelligent Computing in Computational Biology.- Protein Structure and Function Prediction.- Biomarker Discovery.- Hybrid Computational Intelligence: Theory and Application in Bioinformatics, Computational Biology and Systems Biology.- IoT and Smart Data.- Intelligent Systems and Applications for Bioengineering.- Evolutionary Optimization: Foundations and Its Applications to Intelligent Data Analytics.- Protein and Gene Bioinformatics: Analysis, Algorithms and Applications.
This book constitutes the proceedings of the 7th International Conference on Biomimetic and Biohybrid Systems, Living Machines 2018, held in Paris, France, in July 2018.The 40 full and 18 short papers presented in this volume were carefully reviewed and selected from 60 submissions. The theme of the conference targeted at the intersection of research on novel life-like technologies inspired by the scientific investigation of biological systems, biomimetics, and research that seeks to interface biological and artificial systems to create biohybrid systems.
The volume contains original research findings, exchange of ideas and dissemination of innovative, practical development experiences in different fields of soft and advance computing. It provides insights into the International Conference on Soft Computing in Data Analytics (SCDA). It also concentrates on both theory and practices from around the world in all the areas of related disciplines of soft computing. The book provides rapid dissemination of important results in soft computing technologies, a fusion of research in fuzzy logic, evolutionary computations, neural science and neural network systems and chaos theory and chaotic systems, swarm based algorithms, etc. The book aims to cater the postgraduate students and researchers working in the discipline of computer science and engineering along with other engineering branches.
Covering all the essential components of Unix/Linux, including process management, concurrent programming, timer and time service, file systems and network programming, this textbook emphasizes programming practice in the Unix/Linux environment. Systems Programming in Unix/Linux is intended as a textbook for systems programming courses in technically-oriented Computer Science/Engineering curricula that emphasize both theory and programming practice. The book contains many detailed working example programs with complete source code. It is also suitable for self-study by advanced programmers and computer enthusiasts. Systems programming is an indispensable part of Computer Science/Engineering education. After taking an introductory programming course, this book is meant to further knowledge by detailing how dynamic data structures are used in practice, using programming exercises and programming projects on such topics as C structures, pointers, link lists and trees. This book provides a wide range of knowledge about computer systemsoftware and advanced programming skills, allowing readers to interface with operatingsystem kernel, make efficient use of system resources and develop application software.It also prepares readers with the needed background to pursue advanced studies inComputer Science/Engineering, such as operating systems, embedded systems, databasesystems, data mining, artificial intelligence, computer networks, network security,distributed and parallel computing.
This book constitutes the proceedings of the 24th International Conference on Computing and Combinatorics, COCOON 2018, held in Qing Dao, China, in July 2018. The 62 papers presented in this volume were carefully reviewed and selected from 120 submissions. They deal with the areas of algorithms, theory of computation, computational complexity, and combinatorics related to computing.
This book constitutes the refereed post-conference proceedings of the 29th International Workshop on Combinatorial Algorithms, IWOCA 2018, held in Singapore, Singapore, in July 2018. The 31 regular papers presented in this volume were carefully reviewed and selected from 69 submissions. They cover diverse areas of combinatorical algorithms, complexity theory, graph theory and combinatorics, combinatorial optimization, cryptography and information security, algorithms on strings and graphs, graph drawing and labelling, computational algebra and geometry, computational biology, probabilistic and randomised algorithms, algorithms for big data analytics, and new paradigms of computation.
This book presents practical optimization techniques used in image processing and computer vision problems. Ill-posed problems are introduced and used as examples to show how each type of problem is related to typical image processing and computer vision problems. Unconstrained optimization gives the best solution based on numerical minimization of a single, scalar-valued objective function or cost function. Unconstrained optimization problems have been intensively studied, and many algorithms and tools have been developed to solve them. Most practical optimization problems, however, arise with a set of constraints. Typical examples of constraints include: (i) pre-specified pixel intensity range, (ii) smoothness or correlation with neighboring information, (iii) existence on a certain contour of lines or curves, and (iv) given statistical or spectral characteristics of the solution. Regularized optimization is a special method used to solve a class of constrained optimization problems. The term regularization refers to the transformation of an objective function with constraints into a different objective function, automatically reflecting constraints in the unconstrained minimization process. Because of its simplicity and efficiency, regularized optimization has many application areas, such as image restoration, image reconstruction, optical flow estimation, etc. Optimization plays a major role in a wide variety of theories for image processing and computer vision. Various optimization techniques are used at different levels for these problems, and this volume summarizes and explains these techniques as applied to image processing and computer vision.
This book constitutes the refereed proceedings of the 21st International Conference on Theory and Applications of Satisfiability Testing, SAT 2018, held in Oxford, UK, in July 2018.The 20 revised full papers, 4 short papers, and 2 tool papers were carefully reviewed and selected from 58 submissions. The papers address different aspects of SAT interpreted in a broad sense, including theoretical advances (such as exact algorithms, proof complexity, and other complexity issues), practical search algorithms, knowledge compilation, implementation-level details of SAT solvers and SAT-based systems, problem encodings and reformulations, applications as well as case studies and reports on findings based on rigorous experimentation. They are organized in the following topical sections: maximum satisfiability; conflict driven clause learning; model counting; quantified Boolean formulae; theory; minimally unsatisfiable sets; satisfiability modulo theories; and tools and applications. |
![]() ![]() You may like...
Technology In Action Complete, Global…
Alan Evans, Kendall Martin, …
Paperback
R2,803
Discovery Miles 28 030
Gentzen Calculi for Modal Propositional…
Francesca Poggiolesi
Hardcover
R4,233
Discovery Miles 42 330
Development of Navigation Technology for…
Baburov S.V., Bestugin A.R., …
Hardcover
R3,384
Discovery Miles 33 840
|