![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing > Data structures
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource. Feasibility of these systems relies basically on P2P (peer-to-peer) techniques and the support of agent systems with scaling and decentralized control. Synergy between grids, P2P systems and agent technologies is the key to data- and knowledge-centered systems in large-scale environments. This, the 17th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains extended and revised versions of five papers, selected from the 24 full and 8 short papers presented at the 15th International Conference on Data Warehousing and Knowledge Discovery, DaWaK 2013, held in Prague, The Czech Republic, in August 2013. Of the five papers, two cover data warehousing aspects related to query processing optimization in advanced platforms, specifically Map Reduce and parallel databases, and three cover knowledge discovery, specifically the causal network inference problem, dimensionality reduction, and the quality-of-pattern-mining task.
This proceedings is a representation of decades of reasearch, teaching and application in the field. Image Processing, Fusion and Information Technology areas, Digital radio Communication, Wimax, Electrical engg, VLSI approach to processor design, embedded systems design are dealt in detail through models and illustrative techniques.
This book constitutes the refereed proceedings of the 11th Theory of Cryptography Conference, TCC 2014, held in San Diego, CA, USA, in February 2014. The 30 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on obfuscation, applications of obfuscation, zero knowledge, black-box separations, secure computation, coding and cryptographic applications, leakage, encryption, hardware-aided secure protocols, and encryption and signatures.
Grids, P2P and Services Computing, the 12th volume of the CoreGRID series, is based on the CoreGrid ERCIM Working Group Workshop on Grids, P2P and Service Computing in Conjunction with EuroPar 2009. The workshop will take place August 24th, 2009 in Delft, The Netherlands. Grids, P2P and Services Computing, an edited volume contributed by well-established researchers worldwide, will focus on solving research challenges for Grid and P2P technologies. Topics of interest include: Service Level Agreement, Data & Knowledge Management, Scheduling, Trust and Security, Network Monitoring and more. Grids are a crucial enabling technology for scientific and industrial development. This book also includes new challenges related to service-oriented infrastructures. Grids, P2P and Services Computing is designed for a professional audience composed of researchers and practitioners within the Grid community industry. This volume is also suitable for advanced-level students in computer science.
Evolutionary Algorithms (EAs) are population-based, stochastic search algorithms that mimic natural evolution. Due to their ability to find excellent solutions for conventionally hard and dynamic problems within acceptable time, EAs have attracted interest from many researchers and practitioners in recent years. This book "Variants of Evolutionary Algorithms for Real-World Applications" aims to promote the practitioner's view on EAs by providing a comprehensive discussion of how EAs can be adapted to the requirements of various applications in the real-world domains. It comprises 14 chapters, including an introductory chapter re-visiting the fundamental question of what an EA is and other chapters addressing a range of real-world problems such as production process planning, inventory system and supply chain network optimisation, task-based jobs assignment, planning for CNC-based work piece construction, mechanical/ship design tasks that involve runtime-intense simulations, data mining for the prediction of soil properties, automated tissue classification for MRI images, and database query optimisation, among others. These chapters demonstrate how different types of problems can be successfully solved using variants of EAs and how the solution approaches are constructed, in a way that can be understood and reproduced with little prior knowledge on optimisation.
This book constitutes the refereed proceedings of the First International Conference on Applied Algorithms, ICAA 2014, held in Kolkata, India, in January 2014. ICAA is a new conference series with a mission to provide a quality forum for researchers working in applied algorithms. Papers presenting original contributions related to the design, analysis, implementation and experimental evaluation of efficient algorithms and data structures for problems with relevant real-world applications were sought, ideally bridging the gap between academia and industry. The 21 revised full papers presented together with 7 short papers were carefully reviewed and selected from 122 submissions.
In operations research and computer science it is common practice to evaluate the performance of optimization algorithms on the basis of computational results, and the experimental approach should follow accepted principles that guarantee the reliability and reproducibility of results. However, computational experiments differ from those in other sciences, and the last decade has seen considerable methodological research devoted to understanding the particular features of such experiments and assessing the related statistical methods. This book consists of methodological contributions on different scenarios of experimental analysis. The first part overviews the main issues in the experimental analysis of algorithms, and discusses the experimental cycle of algorithm development; the second part treats the characterization by means of statistical distributions of algorithm performance in terms of solution quality, runtime and other measures; and the third part collects advanced methods from experimental design for configuring and tuning algorithms on a specific class of instances with the goal of using the least amount of experimentation. The contributor list includes leading scientists in algorithm design, statistical design, optimization and heuristics, and most chapters provide theoretical background and are enriched with case studies. This book is written for researchers and practitioners in operations research and computer science who wish to improve the experimental assessment of optimization algorithms and, consequently, their design.
This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Milan, Italy, in March 2015. The 11 full papers presented together with 5 short papers were carefully reviewed and selected from 41 submissions. The symposium features the following topics: formal methods; cloud passwords; machine learning; measurements ontologies; and access control.
This book constitutes the proceedings of the 14th IMA International Conference on Cryptography and Coding, IMACC 2013, held at Oxford, UK, in December 2013. The 20 papers presented were carefully reviewed and selected for inclusion in this book. They are organized in topical sections named: bits and booleans; homomorphic encryption; codes and applications; cryptanalysis; protecting against leakage; hash functions; key issues and public key primitives.
This book constitutes the thoroughly refereed conference proceedings of the 9th International Workshop on Algorithms and Computation, WALCOM 2015, held in Dhaka, Bangladesh, in February 2015. The 26 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 85 submissions. The papers are organized in topical sections on approximation algorithms, data structures and algorithms, computational geometry, combinatorial algorithms, distributed and online algorithms, graph drawing and algorithms, combinatorial problems and complexity, and graph enumeration and algorithms.
This book constitutes the refereed proceedings of the 12 European Conference on Wireless Sensor Networks, EWSN 2015, held in Porto, Portugal, in February 2015. The 14 full papers and 9 short papers presented were carefully reviewed and selected from 85 submissions. They cover a wide range of topics grouped into five sessions: services and applications, mobility and delay-tolerance, routing and data dissemination, and human-centric sensing.
This book constitutes the refereed proceedings of the 8th International Conference on Geographic Information Science, GIScience 2014, held in Vienna, Austria in September 2014. The 23 full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections such as information visualization, spatial analysis, user-generated content, semantic models, wayfinding and navigation, spatial algorithms, and spatial relations.
This two volume set LNCS 8630 and 8631 constitutes the proceedings of the 14th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2014, held in Dalian, China, in August 2014. The 70 revised papers presented in the two volumes were selected from 285 submissions. The first volume comprises selected papers of the main conference and papers of the 1st International Workshop on Emerging Topics in Wireless and Mobile Computing, ETWMC 2014, the 5th International Workshop on Intelligent Communication Networks, IntelNet 2014, and the 5th International Workshop on Wireless Networks and Multimedia, WNM 2014. The second volume comprises selected papers of the main conference and papers of the Workshop on Computing, Communication and Control Technologies in Intelligent Transportation System, 3C in ITS 2014, and the Workshop on Security and Privacy in Computer and Network Systems, SPCNS 2014.
This book constitutes the proceedings of the 13th IFIP TC 8 International Conference on Computer Information Systems and Industrial Management, CISIM 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 60 paper presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: algorithms; biometrics and biometrics applications; data analysis and information retrieval; industrial management and other applications; modelling and optimization; networking; pattern recognition and image processing; and various aspects of computer security.
Dynamic logic (DL) recently had a highest impact on the development in several areas of modeling and algorithm design. The book discusses classical algorithms used for 30 to 50 years (where improvements are often measured by signal-to-clutter ratio), and also new areas, which did not previously exist. These achievements were recognized by National and International awards. Emerging areas include cognitive, emotional, intelligent systems, data mining, modeling of the mind, higher cognitive functions, evolution of languages and other. Classical areas include detection, recognition, tracking, fusion, prediction, inverse scattering, and financial prediction. All these classical areas are extended to using mixture models, which previously was considered unsolvable in most cases. Recent neuroimaging experiments proved that the brain-mind actually uses DL. "Emotional Cognitive Neural Algorithms with Engineering Applications" is written for professional scientists and engineers developing computer and information systems, for professors teaching modeling and algorithms, and for students working on Masters and Ph.D. degrees in these areas. The book will be of interest to psychologists and neuroscientists interested in mathematical models of the brain and min das well.
For all users who work with ISPF on z/OS MVS. The readers of this book will learn how to use the ISPF professionally in their daily work in z/OS to quickly reach optimal results: - Detailed description of TSO/ISPF logon processes - Use of ISPF command tables - DSLIST - Optimal use of Data Set Lists - Use of Object / Action Workplace as an optimal work surface - Detailed description on use of the ISPF editor - Utilities for allocated data sets - Secret commands usable in ISPF - Descriptions for using the downloadable SMART ISPF Utilities The author gives many useful hints and tips based on his extensive experience working with ISPF. The applications of all the major ISPF commands are demonstrated by examples from practice. The book can be used as a teaching aid as well as a practical guide for daily work.
The Role of the Computer in Statistics David Cox Nuffield College, Oxford OXIINF, U.K. A classification of statistical problems via their computational demands hinges on four components (I) the amount and complexity of the data, (il) the specificity of the objectives of the analysis, (iii) the broad aspects of the approach to analysis, (ill) the conceptual, mathematical and numerical analytic complexity of the methods. Computational requi rements may be limiting in (I) and (ill), either through the need for special programming effort, or because of the difficulties of initial data management or because of the load of detailed analysis. The implications of modern computational developments for statistical work can be illustrated in the context of the study of specific probabilistic models, the development of general statistical theory, the design of investigations and the analysis of empirical data. While simulation is usually likely to be the most sensible way of investigating specific complex stochastic models, computerized algebra has an obvious role in the more analyti cal work. It seems likely that statistics and applied probability have made insufficient use of developments in numerical analysis associated more with classical applied mathematics, in particular in the solution of large systems of ordinary and partial differential equations, integral equations and integra-differential equations and for the centsraction of "useful" in formation from integral transforms. Increasing emphasis on models incorporating specific subject-matter considerations is one route to bridging the gap between statistical ana."
The world of the twenty-?rst century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identi?cation is growing, not only in companies and organizations, but also in the world at large. Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. Identity management challenges the information security research community to focus on interdisciplinary and holistic approaches while retaining the bene?ts of previous research e?orts. As part of this tendency, surveillance and monitoring are more prominently present in society, both in the public and private domain. The original intention being to contribute to security and safety, surveillance and monitoring might, in some cases, have unintended or even contradictory e?ects. Besides, the - nipresence of surveillance and monitoring systems might be at daggers drawn with public and democratic liberties. In this context, IFIP (International Federation for Information Processing) Working Group 11.6 on Identity Management organized its second working c- ferenceonPoliciesandResearchinIdentityManagement(IDMAN2010)inOslo, Norway, November 18-19, 2010. Papers o?ering research contributions focusing on identity management in general and surveillance and monitoring in parti- lar were solicited for submission. The submitted papers were in general of high quality. All papers were reviewed by two to ?ve members of the international ProgramCommittee. Nine of the submitted papers, whicharepublishedin these proceedings, were ?nally unanimously accepted for presentationby the Program Committee. WeareverygratefultotheNorwegiangovernmentforfundingthisconferenc
The two-volume set LNCS 8297 and LNCS 8298 constitutes the proceedings of the 4th International Conference on Swarm, Evolutionary and Memetic Computing, SEMCCO 2013, held in Chennai, India, in December 2013. The total of 123 papers presented in this volume was carefully reviewed and selected for inclusion in the proceedings. They cover cutting-edge research on swarm, evolutionary and memetic computing, neural and fuzzy computing and its application.
This book constitutes the thoroughly refereed proceedings of the 15th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2013, held in Pozna, Poland, in October 2013. The 63 revised full papers were carefully selected from 111 submissions. The topics covered are aquisition, pre-processing and coding, biometry, classification and recognition, depth, 3D and tracking, efficient implementation and frameworks, low level image analysis, segmentation and video analysis."
The two-volume set LNCS 8258 and 8259 constitutes the refereed proceedings of the 18th Iberoamerican Congress on Pattern Recognition, CIARP 2013, held in Havana, Cuba, in November 2013. The 137 papers presented, together with two keynotes, were carefully reviewed and selected from 262 submissions. The papers are organized in topical sections on mathematical theory of PR, supervised and unsupervised classification, feature or instance selection for classification, image analysis and retrieval, signals analysis and processing, applications of pattern recognition, biometrics, video analysis, and data mining.
The two-volume set LNCS 8258 and 8259 constitutes the refereed proceedings of the 18th Iberoamerican Congress on Pattern Recognition, CIARP 2013, held in Havana, Cuba, in November 2013. The 137 papers presented, together with two keynotes, were carefully reviewed and selected from 262 submissions. The papers are organized in topical sections on mathematical theory of PR, supervised and unsupervised classification, feature or instance selection for classification, image analysis and retrieval, signals analysis and processing, applications of pattern recognition, biometrics, video analysis, and data mining.
This book constitutes the refereed proceedings of the First Australasian Conference on Artificial Life and Computational Intelligence, ACALCI 2015, held in Newcastle, NSW, Australia, in February 2015. The 34 revised full papers presented were carefully reviewed and selected from 63 submissions. The papers are organized in the following topical sections: philosophy and theory; game environments and methods; learning, memory and optimization; and applications and implementations.
The book constitutes the refereed proceedings of the 17th European Conference on Genetic Programming, Euro GP 2014, held in Grenada, Spain, in April 2014 co-located with the Evo*2014 events, Evo BIO, Evo COP, Evo MUSART and Evo Applications. The 15 revised full papers presented together with 5 poster papers were carefully reviewed and selected form 40 submissions. The wide range of topics in this volume reflects the current state of research in the field. Thus, we see topics as diverse as search-based software engineering, image analysis, dynamical systems, evolutionary robotics and operational research to the foundations of search as characterized through semantic variation operators.
This book constitutes the refereed proceedings of the 8th Chinese Conference on Biometric Recognition, CCBR 2013, held in Jinan, China, in November 2013. The 57 revised full papers presented were carefully reviewed and selected from among 100 submissions. The papers address the problems in face, fingerprint, palm print, vein biometrics, iris and ocular biometrics, behavioral biometrics and other related topics, and contribute new ideas to research and development of reliable and practical solutions for biometric authentication. |
You may like...
Linux Malware Incident Response: A…
Cameron H. Malin, Eoghan Casey, …
Paperback
R432
Discovery Miles 4 320
Java Foundations - Pearson New…
John Lewis, Peter DePasquale, …
Paperback
R2,615
Discovery Miles 26 150
Web Portal Design, Implementation…
Jana Polgar, Greg Adamson
Hardcover
R4,798
Discovery Miles 47 980
|