![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > Data structures
This book constitutes the proceedings of the Third International Symposium on Dependable Software Engineering: Theories, Tools, and Applications, SETTA 2018, held in Beijing, China, in September 2018. The 9 full papers presented together with 3 short papers were carefully reviewed and selected from 22 submissions. The purpose of SETTA is to provide an international forum for researchers and practitioners to share cutting-edge advancements and strengthen collaborations in the field of formal methods and its interoperability with software engineering for building reliable, safe, secure, and smart systems.
This book constitutes the refereed proceedings of the 15th European Workshop on Computer Performance Engineering, EPEW 2018, held in Paris, France, in October 2018. The 17 papers presented together with the abstracts of two invited talks in this volume were carefully reviewed and selected from 27 submissions. The papers presented at the workshop reflect the diversity of modern performance engineering, with topics ranging from advances in performanceengineering realm, including, dependability and security modeling, performance oriented model verification and testing, hardware and software systems case-studies, applications/extensions of queuing theory and network design
Build interactive, database-driven websites with PHP 7, MySQL 8, and MariaDB. The focus of this book is on getting you up and running as quickly as possible with real-world applications. In the first two chapters, you will set up your development and testing environment, and then build your first PHP and MariaDB or MySQL database-driven website. You will then increase its sophistication, security, and functionality throughout the course of the book. The PHP required is taught in context within each project so you can quickly learn how PHP integrates with MariaDB and MySQL to create powerful database-driven websites. Each project is fully illustrated, so you will see clearly what you are building as you create your own database-driven website. You will build a form for registering users, and then build an interface so that an administrator can view and administer the user database. You will create a message board for users and a method for emailing them. You will also learn the best practices for ensuring that your website databases are secure. Later chapters describe how to create a product catalog, and a simple e-commerce site. You will also discover how to migrate a database to a remote host. The final chapter will demonstrate the advantages of migrating to Oracle's MySQL 8. You will be shown step by step migration directions along with a demonstration of the tools available in SQL Workbench. Because you are building the interactive pages yourself, you will know exactly how MySQL, MariaDB, and PHP all work together, and you will be able to add database interactivity to your own websites with ease. What You Will Learn Build a secure database-driven website using PHP 7, MySQL 8, and MariaDB Create a product catalog Write a message board Move towards e-commerce Employ security and validation measures Migrate to Oracle's MySQL 8 Server platform Who This Book Is For Web developers with HTML, CSS and a limited Bootstrap experience. Readers need little to no prior experience with PHP and MySQL.
This book constitutes the refereed proceedings of the 10th International Symposium on Search-Based Software Engineering, SSBSE 2018, held in Montpellier, France, in September 2018. The 12 full papers and 7 short papers presented together with 3 keynotes, 2 tutorials, and 1 anniversary paper were carefully reviewed and selected from 21 submissions. SSBSE welcomes not only applications from throughout the software engineering lifecycle but also a broad range of search methods ranging from exact Operational Research techniques to nature-inspired algorithms and simulated annealing. Chapter "Deploying Search Based Software Engineering with Sapienz at Facebook" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This two-volume set LNCS 11101 and 11102 constitutes the refereed proceedings of the 15th International Conference on Parallel Problem Solving from Nature, PPSN 2018, held in Coimbra, Portugal, in September 2018. The 79 revised full papers were carefully reviewed and selected from 205 submissions. The papers cover a wide range of topics in natural computing including evolutionary computation, artificial neural networks, artificial life, swarm intelligence, artificial immune systems, self-organizing systems, emergent behavior, molecular computing, evolutionary robotics, evolvable hardware, parallel implementations and applications to real-world problems. The papers are organized in the following topical sections: numerical optimization; combinatorial optimization; genetic programming; multi-objective optimization; parallel and distributed frameworks; runtime analysis and approximation results; fitness landscape modeling and analysis; algorithm configuration, selection, and benchmarking; machine learning and evolutionary algorithms; and applications. Also included are the descriptions of 23 tutorials and 6 workshops which took place in the framework of PPSN XV.
This two-volume set LNCS 11101 and 11102 constitutes the refereed proceedings of the 15th International Conference on Parallel Problem Solving from Nature, PPSN 2018, held in Coimbra, Portugal, in September 2018. The 79 revised full papers were carefully reviewed and selected from 205 submissions. The papers cover a wide range of topics in natural computing including evolutionary computation, artificial neural networks, artificial life, swarm intelligence, artificial immune systems, self-organizing systems, emergent behavior, molecular computing, evolutionary robotics, evolvable hardware, parallel implementations and applications to real-world problems. The papers are organized in the following topical sections: numerical optimization; combinatorial optimization; genetic programming; multi-objective optimization; parallel and distributed frameworks; runtime analysis and approximation results; fitness landscape modeling and analysis; algorithm configuration, selection, and benchmarking; machine learning and evolutionary algorithms; and applications. Also included are the descriptions of 23 tutorials and 6 workshops which took place in the framework of PPSN XV.
Incomplete data is part of life and almost all areas of scientific studies. Users tend to skip certain fields when they fill out online forms; participants choose to ignore sensitive questions on surveys; sensors fail, resulting in the loss of certain readings; publicly viewable satellite map services have missing data in many mobile applications; and in privacy-preserving applications, the data is incomplete deliberately in order to preserve the sensitivity of some attribute values. Query processing is a fundamental problem in computer science, and is useful in a variety of applications. In this book, we mostly focus on the query processing over incomplete databases, which involves finding a set of qualified objects from a specified incomplete dataset in order to support a wide spectrum of real-life applications. We first elaborate the three general kinds of methods of handling incomplete data, including (i) discarding the data with missing values, (ii) imputation for the missing values, and (iii) just depending on the observed data values. For the third method type, we introduce the semantics of k-nearest neighbor (kNN) search, skyline query, and top-k dominating query on incomplete data, respectively. In terms of the three representative queries over incomplete data, we investigate some advanced techniques to process incomplete data queries, including indexing, pruning as well as crowdsourcing techniques.
This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.
This book constitutes the refereed proceedings of the 9th International Conference on Computational Logistics, ICCL 2018, held in Vietri sul Mare, Italy, in October 2018. The 32 full papers presented were carefully reviewed and selected from 71 submissions. They are organized in topical sections as follows: maritime shipping and routing, container handling and container terminals, vehicle routing and multi-modal transportation, network design and scheduling, logistics oriented combinatorial optimization.
This two-volume set (LNAI 11055 and LNAI 11056) constitutes the refereed proceedings of the 10th International Conference on Collective Intelligence, ICCCI 2018, held in Bristol, UK, in September 2018 The 98 full papers presented were carefully reviewed and selected from 240 submissions. The conference focuses on knowledge engineering and semantic web, social network analysis, recommendation methods and recommender systems, agents and multi-agent systems, text processing and information retrieval, data mining methods and applications, decision support and control systems, sensor networks and internet of things, as well as computer vision techniques.
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-edge research and innovative findings from leading researchers. The characteristic feature of all the contributions in this book is their relevance for the practical application of security principles to a variety of widely used communication techniques, including: multiantenna systems, ultra-wide-band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, building a bridge between two usually distinct worlds. The book gathers extended versions of contributions delivered at the Second Workshop on Communication Security, held in Paris, France, in April 2017 and affiliated with the conference EUROCRYPT 2017.
This two-volume set (LNAI 11055 and LNAI 11056) constitutes the refereed proceedings of the 10th International Conference on Collective Intelligence, ICCCI 2018, held in Bristol, UK, in September 2018 The 98 full papers presented were carefully reviewed and selected from 240 submissions. The conference focuses on knowledge engineering and semantic web, social network analysis, recommendation methods and recommender systems, agents and multi-agent systems, text processing and information retrieval, data mining methods and applications, decision support and control systems, sensor networks and internet of things, as well as computer vision techniques.
The LNCS volume 10996 constitutes the proceedings of the 13th Chinese Conference on Biometric Recognition, held in Urumchi, China, in August 2018. The 79 regular papers presented in this book were carefully reviewed and selected from 112 submissions. The papers cover a wide range of topics such as Biometrics, Speech recognition, Activity recognition and understanding, Online handwriting recognition, System forensics, Multi-factor authentication, Graphical and visual passwords.
This book constitutes the refereed joint proceedings of the First International Workshop on Computational Pathology, COMPAY 2018, and the 5th International Workshop on Ophthalmic Medical Image Analysis, OMIA 2018, held in conjunction with the 21st International Conference on Medical Imaging and Computer-Assisted Intervention, MICCAI 2018, in Granada, Spain, in September 2018. The 19 full papers (out of 25 submissions) presented at COMPAY 2018 and the 21 full papers (out of 31 submissions) presented at OMIA 2018 were carefully reviewed and selected. The COMPAY papers focus on artificial intelligence and deep learning. The OMIA papers cover various topics in the field of ophthalmic image analysis.
This book constitutes the refereed joint proceedings of the Second International Workshop on Graphs in Biomedical Image Analysis, GRAIL 2018 and the First International Workshop on Integrating Medical Imaging and Non-Imaging Modalities, Beyond MIC 2018, held in conjunction with the 21st International Conference on Medical Imaging and Computer-Assisted Intervention, MICCAI 2018, in Granada, Spain, in September 2018. The 6 full papers presented at GRAIL 2018 and the 5 full papers presented at BeYond MIC 2018 were carefully reviewed and selected. The GRAIL papers cover a wide range of develop graph-based models for the analysis of biomedical images and encourage the exploration of graph-based models for difficult clinical problems within a variety of biomedical imaging contexts. The Beyond MIC papers cover topics of novel methods with significant imaging and non-imaging components, addressing practical applications and new datasets
This book constitutes the proceedings of the Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition, S+SSPR 2018, held in Beijing, China, in August 2018. The 49 papers presented in this volume were carefully reviewed and selected from 75 submissions. They were organized in topical sections named: classification and clustering; deep learning and neurla networks; dissimilarity representations and Gaussian processes; semi and fully supervised learning methods; spatio-temporal pattern recognition and shape analysis; structural matching; multimedia analysis and understanding; and graph-theoretic methods.
The volume on Data Management, Analytics and Innovations presents the latest high-quality technical contributions and research results in the areas of data management and smart computing, big data management, artificial intelligence and data analytics along with advances in network technologies. It deals with the state-of-the-art topics and provides challenges and solutions for future development. Original, unpublished research work highlighting specific research domains from all viewpoints are contributed from scientists throughout the globe. This volume is mainly designed for professional audience, composed of researchers and practitioners in academia and industry.
This book constitutes the proceedings of the 16th Russian Conference on Artificial Intelligence, RCAI 2018, Moscow, Russia, in September 2018. The 22 full papers presented along with 4 short papers in this volume were carefully reviewed and selected from 75 submissions. The conference deals with a wide range of topics, including data mining and knowledge discovery, text mining, reasoning, decision making, natural language processing, vision, intelligent robotics, multi-agent systems, machine learning, ontology engineering.
This two-volume set (CCIS 873 and CCIS 874) constitutes the thoroughly refereed proceedings of the 9th International Symposium, ISICA 2017, held in Guangzhou, China, in November 2017.The 101 full papers presented in both volumes were carefully reviewed and selected from 181 submissions. This first volume is organized in topical sections on neural networks and statistical learning: neural architecture search, transfer of knowledge; evolutionary multi-objective and dynamic optimization: optimal control and design, hybrid methods; data mining: association rule learning, data management platforms; Cloud computing and multiagent systems: service models, Cloud engineering; everywhere connectivity: IoT solutions, wireless sensor networks.
Large-scale, highly interconnected networks, which are often modeled as graphs, pervade both our society and the natural world around us. Uncertainty, on the other hand, is inherent in the underlying data due to a variety of reasons, such as noisy measurements, lack of precise information needs, inference and prediction models, or explicit manipulation, e.g., for privacy purposes. Therefore, uncertain, or probabilistic, graphs are increasingly used to represent noisy linked data in many emerging application scenarios, and they have recently become a hot topic in the database and data mining communities. Many classical algorithms such as reachability and shortest path queries become #P-complete and, thus, more expensive over uncertain graphs. Moreover, various complex queries and analytics are also emerging over uncertain networks, such as pattern matching, information diffusion, and influence maximization queries. In this book, we discuss the sources of uncertain graphs and their applications, uncertainty modeling, as well as the complexities and algorithmic advances on uncertain graphs processing in the context of both classical and emerging graph queries and analytics. We emphasize the current challenges and highlight some future research directions.
This two-volume set (CCIS 873 and CCIS 874) constitutes the thoroughly refereed proceedings of the 9th International Symposium, ISICA 2017, held in Guangzhou, China, in November 2017. The 101 full papers presented in both volumes were carefully reviewed and selected from 181 submissions. This second volume is organized in topical sections on swarm intelligence: cooperative Search, swarm optimization; complex systems modeling: system dynamic, multimedia simulation; intelligent information systems: information retrieval, e-commerce platforms; artificial intelligence and robotics: query optimization, intelligent engineering; virtualization: motion-based tracking, image recognition.
This monograph gives a thorough treatment of the celebrated compositions of signature and encryption that allow for verifiability, that is, to efficiently prove properties about the encrypted data. This study is provided in the context of two cryptographic primitives: (1) designated confirmer signatures, an opaque signature which was introduced to control the proliferation of certified copies of documents, and (2) signcryption, a primitive that offers privacy and authenticity at once in an efficient way. This book is a useful resource to researchers in cryptology and information security, graduate and PhD students, and security professionals.
This handbook covers Electronic Medical Record (EMR) systems, which enable the storage, management, and sharing of massive amounts of demographic, diagnosis, medication, and genomic information. It presents privacy-preserving methods for medical data, ranging from laboratory test results to doctors' comments. The reuse of EMR data can greatly benefit medical science and practice, but must be performed in a privacy-preserving way according to data sharing policies and regulations. Written by world-renowned leaders in this field, each chapter offers a survey of a research direction or a solution to problems in established and emerging research areas. The authors explore scenarios and techniques for facilitating the anonymization of different types of medical data, as well as various data mining tasks. Other chapters present methods for emerging data privacy applications and medical text de-identification, including detailed surveys of deployed systems. A part of the book is devoted to legislative and policy issues, reporting on the US and EU privacy legislation and the cost of privacy breaches in the healthcare domain. This reference is intended for professionals, researchers and advanced-level students interested in safeguarding medical data.
This is a book about numbers and how those numbers are represented in and operated on by computers. It is crucial that developers understand this area because the numerical operations allowed by computers, and the limitations of those operations, especially in the area of floating point math, affect virtually everything people try to do with computers. This book aims to fill this gap by exploring, in sufficient but not overwhelming detail, just what it is that computers do with numbers. Divided into two parts, the first deals with standard representations of integers and floating point numbers, while the second examines several other number representations. Details are explained thoroughly, with clarity and specificity. Each chapter ends with a summary, recommendations, carefully selected references, and exercises to review the key points. Topics covered include interval arithmetic, fixed-point numbers, big integers and rational arithmetic. This new edition has three new chapters: Pitfalls of Floating-Point Numbers (and How to Avoid Them), Arbitrary Precision Floating Point, and Other Number Systems. This book is for anyone who develops software including software engineers, scientists, computer science students, engineering students and anyone who programs for fun.
These contributions, written by the foremost international researchers and practitioners of Genetic Programming (GP), explore the synergy between theoretical and empirical results on real-world problems, producing a comprehensive view of the state of the art in GP. Topics in this volume include: multi-objective genetic programming, learning heuristics, Kaizen programming, Evolution of Everything (EvE), lexicase selection, behavioral program synthesis, symbolic regression with noisy training data, graph databases, and multidimensional clustering. It also covers several chapters on best practices and lesson learned from hands-on experience. Additional application areas include financial operations, genetic analysis, and predicting product choice. Readers will discover large-scale, real-world applications of GP to a variety of problem domains via in-depth presentations of the latest and most significant results. |
![]() ![]() You may like...
Data Abstraction and Problem Solving…
Janet Prichard, Frank Carrano
Paperback
R2,263
Discovery Miles 22 630
Python Programming for Computations…
Computer Language
Hardcover
|