![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing > Data structures
The two-volume set LNAI 8265 and LNAI 8266 constitutes the proceedings of the 12th Mexican International Conference on Artificial Intelligence, MICAI 2013, held in Mexico City, Mexico, in November 2013. The total of 85 papers presented in these proceedings were carefully reviewed and selected from 284 submissions. The first volume deals with advances in artificial intelligence and its applications and is structured in the following five sections: logic and reasoning; knowledge-based systems and multi-agent systems; natural language processing; machine translation; and bioinformatics and medical applications. The second volume deals with advances in soft computing and its applications and is structured in the following eight sections: evolutionary and nature-inspired metaheuristic algorithms; neural networks and hybrid intelligent systems; fuzzy systems; machine learning and pattern recognition; data mining; computer vision and image processing; robotics, planning and scheduling and emotion detection, sentiment analysis and opinion mining.
This book constitutes the thoroughly refereed conference proceedings of the Third International Conference on Algorithmic Decision Theory, ADT 2013, held in November 2013 in Bruxelles, Belgium. The 33 revised full papers presented were carefully selected from more than 70 submissions, covering preferences in reasoning and decision making, uncertainty and robustness in decision making, multi-criteria decision analysis and optimization, collective decision making, learning and knowledge extraction for decision support.
This book constitutes the refereed proceedings of the 4th International Conference on Decision and Game Theory for Security, GameSec 2013, held in Fort Worth, TX, USA, in November 2013. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. The conference focuses on analytical models based on game, information, communication, optimization, decision, and control theories that are applied to diverse security topics. At the same time, the connection between theoretical models and real world security problems are emphasized to establish the important feedback loop between theory and practice. Observing the scarcity of venues for researchers who try to develop a deeper theoretical understanding of the underlying incentive and resource allocation issues in security, we believe that GameSec will fill an important void and serve as a distinguished forum of highest standards for years to come.
Parsing, the syntactic analysis of language, has been studied extensively in computer science and computational linguistics. Computer programs and natural languages share an underlying theory of formal languages and require efficient parsing algorithms. This introduction reviews the theory of parsing from a novel perspective. It provides a formalism to capture the essential traits of a parser that abstracts from the fine detail and allows a uniform description and comparison of a variety of parsers, including Earley, Tomita, LR, Left-Corner, and Head-Corner parsers. The emphasis is on context-free phrase structure grammar and how these parsers can be extended to unification formalisms. The book combines mathematical rigor with high readability and is suitable as a graduate course text.
N etwork-based computing domain unifies all best research efforts presented from single computer systems to networked systems to render overwhelming computational power for several modern day applications. Although this power is expected to grow with respect to time due to tech nological advancements, application requirements impose a continuous thrust on network utilization and on the resources to deliver supreme quality of service. Strictly speaking, network-based computing dornain has no confined scope and each element offers considerable challenges. Any modern day networked application strongly thrives on efficient data storage and management system, which is essentially a Database System. There have been nurnber of books-to-date in this domain that discuss fundamental principles of designing a database systern. Research in this dornain is now far matured and rnany researchers are venturing in this dornain continuously due to a wide variety of challenges posed. In this book, our dornain of interest is in exposing the underlying key challenges in designing algorithms to handle unpredictable requests that arrive at a Distributed Database System(DDBS) and evaluating their performance. These requests are otherwise called as on-line requests arriving at a system to process. Transactions in an on-line Banking service, Airline Reservation systern, Video-on-Demand systern, etc, are few examples of on-line requests."
This book constitutes the refereed proceedings of the 14th International Conference on Systems Simulation, Asia Simulation 2014, held in Kitakyushu, Japan, in October 2014. The 32 revised full papers presented were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections on modeling and simulation technology; network simulation; high performance computing and cloud simulation; numerical simulation and visualization; simulation of instrumentation and control application; simulation technology in diversified higher education; general purpose simulation.
This book constitutes the refereed proceedings of the 13th International Conference on Machine Learning and Cybernetics, Lanzhou, China, in July 2014. The 45 revised full papers presented were carefully reviewed and selected from 421 submissions. The papers are organized in topical sections on classification and semi-supervised learning; clustering and kernel; application to recognition; sampling and big data; application to detection; decision tree learning; learning and adaptation; similarity and decision making; learning with uncertainty; improved learning algorithms and applications.
This book constitutes thoroughly revised selected papers of the 5th International Conference on Numerical Analysis and ItsApplications, NAA 2012, held in Lozenetz, Bulgaria, in June 2012. The 65 revised papers presented were carefully reviewed and selected from various submissions. The papers cover a broad area of topics of interest such as numerical approximation and computational geometry; numerical linear algebra and numerical solution of transcendental equation; numerical methods for differential equations; numerical stochastics, numerical modeling; and high performance scientific computing."
Some recent fuzzy database modeling advances for the
non-traditional applications are introduced in this book. The focus
is on database models for modeling complex information and
uncertainty at the conceptual, logical, physical design levels and
from integrity constraints defined on the fuzzy relations.
This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.
This book constitutes the proceedings of the Joint IAPR International Workshop on Structural, Syntactic, and Statistical Pattern Recognition, S+SSPR 2014; comprising the International Workshop on Structural and Syntactic Pattern Recognition, SSPR, and the International Workshop on Statistical Techniques in Pattern Recognition, SPR. The total of 25 full papers and 22 poster papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections named: graph kernels; clustering; graph edit distance; graph models and embedding; discriminant analysis; combining and selecting; joint session; metrics and dissimilarities; applications; partial supervision; and poster session.
This book constitutes the refereed proceedings of the 14th International Conference on Intelligent Data Engineering and Automated Learning, IDEAL 2013, held in Hefei, China, in October 2013. The 76 revised full papers presented were carefully reviewed and selected from more than 130 submissions. These papers provided a valuable collection of latest research outcomes in data engineering and automated learning, from methodologies, frameworks and techniques to applications. In addition to various topics such as evolutionary algorithms, neural networks, probabilistic modelling, swarm intelligent, multi-objective optimisation, and practical applications in regression, classification, clustering, biological data processing, text processing, video analysis, including a number of special sessions on emerging topics such as adaptation and learning multi-agent systems, big data, swarm intelligence and data mining, and combining learning and optimisation in intelligent data engineering.
This book constitutes the refereed proceedings of the 19th International Conference on Technologies and Applications of Artificial Intelligence, held in Taipei, Taiwan, in November 2014. The 23 revised full papers, 3 short papers, and 8 workshop papers presented at the international track of the conference were carefully reviewed and selected from overall 93 submissions to the international track, domestic track, and international workshops for inclusion in this volume. The papers feature original research results and practical development experiences among researchers and application developers from the many AI related areas including machine learning, data mining, statistics, computer vision, web intelligence, information retrieval, and computer games.
This book constitutes the refereed proceedings of the 6th International Conference on Similarity Search and Applications, SISAP 2013, held in A Coruna, Spain, in October 2013. The 19 full papers, 6 short papers and 2 demo papers, presented were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on new scenarios and approaches; improving similarity search methods and techniques; metrics and evaluation; applications and specific domains; and implementation and engineering solutions."
This book constitutes the refereed proceedings of the 4th International Conference on Computational Logistics, ICCL 2013, held in Copenhagen, Denmark, in September 2013. The 19 papers presented in this volume were carefully reviewed and selected for inclusion in the book. They are organized in topical sections named: maritime shipping, road transport, vehicle routing problems, aviation applications, and logistics and supply chain management.
This book constitutes the refereed conference proceedings of the 12th International Conference on Intelligent Data Analysis, which was held in October 2013 in London, UK. The 36 revised full papers together with 3 invited papers were carefully reviewed and selected from 84 submissions handling all kinds of modeling and analysis methods, irrespective of discipline. The papers cover all aspects of intelligent data analysis, including papers on intelligent support for modeling and analyzing data from complex, dynamical systems.
This book constitutes the proceedings of the First International Conference on Security Standardisation Research, SSR 2014, which was held in London, UK, in December 2014. The 14 full papers presented in this volume were carefully reviewed and selected from 22 submissions. The papers cover a range of topics in the field of security standardisation research, including cryptographic evaluation, standards development, analysis with formal methods, potential future areas of standardisation, and improving existing standards.
This book constitutes the refereed proceedings of the 11th International Conference on Distributed Computing and Internet Technology, ICDCIT 2015, held in Bhubaneswar, India, in February 2015. The 12 revised full papers presented together with 30 short papers and 9 invited talks in this volume were carefully reviewed and selected from 221 submissions. The papers cover topics such as distributed computing and algorithms; internet technologies and Web services; secure computing and communication; cloud computing; information retrieval and recommender systems and societal applications.
This book constitutes the proceedings of the 12th IFIP TC 8 International Conference, CISIM 2013, held in Cracow, Poland, in September 2013. The 44 papers presented in this volume were carefully reviewed and selected from over 60 submissions. They are organized in topical sections on biometric and biomedical applications; pattern recognition and image processing; various aspects of computer security, networking, algorithms, and industrial applications. The book also contains full papers of a keynote speech and the invited talk.
Embedded Firmware Solutions is the perfect introduction and daily-use field guide--for the thousands of firmware designers, hardware engineers, architects, managers, and developers--to Intel's new firmware direction (including Quark coverage), showing how to integrate Intel (R) Architecture designs into their plans. Featuring hands-on examples and exercises using Open Source codebases, like Coreboot and EFI Development Kit (tianocore) and Chromebook, this is the first book that combines a timely and thorough overview of firmware solutions for the rapidly evolving embedded ecosystem with in-depth coverage of requirements and optimization.
This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense.
This book constitutes the refereed proceedings of the 13th International Workshop on Algorithms in Bioinformatics, WABI 2013, held in Sophia Antipolis, France, in September 2013. WABI 2013 is one of seven workshops which, along with the European Symposium on Algorithms (ESA), constitute the ALGO annual meeting and highlights research in algorithmic work for bioinformatics, computational biology and systems biology. The goal is to present recent research results, including significant work-in-progress, and to identify and explore directions of future research. The 27 full papers presented were carefully reviewed and selected from 61 submissions. The papers cover all aspects of algorithms in bioinformatics, computational biology and systems biology.
In the telecom world, services have usually been conceived with a specific mindset. This mindset has defined the traditional characteristics of these services; services distinguished by their linkage with the access network, tight control over service use (e.g., authentication, billing), lack of deep personalization capabilities (mass services only) and reliance on standardization to achieve end-to-end interoperability between all the actors of the value chain (e.g., operators, platform manufacturers, device manufactures). This book offers insights into this complex but exciting world of telecommunications characterized by constant evolution, and approaches it from technology as well as business perspectives. The book is appropriately structured in three parts: (a) an overview of the state-of-the-art in fixed/mobile NGN and standardization activities; (b) an analysis of the competitive landscape between operators, device manufactures and OTT providers, emphasizing why network operators are challenged on their home turf; and (c) opportunities for business modeling and innovative telecom service offers.
This book defines the application of Information Technology's systematic and automated knowledge mapping methodology to collect, analyze and report nanotechnology research on a global basis. The result of these analyses is be a systematic presentation of the state of the art of nanotechnology, which will include basic analysis, content analysis, and citation network analysis of comprehensive nanotechnology findings across technology domains, inventors, institutions, and countries.
In this substantive yet accessible book, pioneering software designer Alexander Stepanov and his colleague Daniel Rose illuminate the principles of generic programming and the mathematical concept of abstraction on which it is based, helping you write code that is both simpler and more powerful. If you're a reasonably proficient programmer who can think logically, you have all the background you'll need. Stepanov and Rose introduce the relevant abstract algebra and number theory with exceptional clarity. They carefully explain the problems mathematicians first needed to solve, and then show how these mathematical solutions translate to generic programming and the creation of more effective and elegant code. To demonstrate the crucial role these mathematical principles play in many modern applications, the authors show how to use these results and generalized algorithms to implement a real-world public-key cryptosystem. As you read this book, you'll master the thought processes necessary for effective programming and learn how to generalize narrowly conceived algorithms to widen their usefulness without losing efficiency. You'll also gain deep insight into the value of mathematics to programming-insight that will prove invaluable no matter what programming languages and paradigms you use. You will learn about How to generalize a four thousand-year-old algorithm, demonstrating indispensable lessons about clarity and efficiency Ancient paradoxes, beautiful theorems, and the productive tension between continuous and discrete A simple algorithm for finding greatest common divisor (GCD) and modern abstractions that build on it Powerful mathematical approaches to abstraction How abstract algebra provides the idea at the heart of generic programming Axioms, proofs, theories, and models: using mathematical techniques to organize knowledge about your algorithms and data structures Surprising subtleties of simple programming tasks and what you can learn from them How practical implementations can exploit theoretical knowledge |
You may like...
Design and Optimization of Sensors and…
Vinod Kumar Singh, Ratnesh Tiwari, …
Hardcover
R5,892
Discovery Miles 58 920
Smartphone-Based Indoor Map Construction…
Ruipeng Gao, Fan Ye, …
Paperback
R1,408
Discovery Miles 14 080
Algorithms, Methods, and Applications in…
Agustinus Borgy Waluyo
Hardcover
R5,123
Discovery Miles 51 230
Enabling Technologies for Effective…
Mohd Abdul Ahad, Gabriella Casalino, …
Hardcover
R4,636
Discovery Miles 46 360
Virtual and Mobile Healthcare…
Information Reso Management Association
Hardcover
R10,915
Discovery Miles 109 150
|