![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > General theory of computing > Data structures
This book constitutes the refereed proceedings of the Third International Conference on Biologically Inspired Music, Sound, Art and Design, Evo MUSART 2014, held in Granada, Spain, in April 2014, co-located with the Evo* 2013 events Euro GP, Evo COP, Evo BIO and Evo Applications. The 11 revised full papers presented were carefully reviewed and selected from 30 submissions. They cover a wide range of topics and application areas.
This book constitutes the refereed proceedings of the 14th European Conference on Evolutionary Computation in Combinatorial Optimization, Evo COP 2014, held in Granada, Spain, in April 2014, co-located with the Evo*2014 events Euro GP, Evo BIO, Evo MUSART and Evo Applications. The 20 revised full papers presented were carefully reviewed and selected from 42 submissions. The papers cover the following topics: swarm intelligence algorithms, fitness landscapes and adaptive algorithms, real world and routing problems and cooperative and metaheuristic search.
This volume constitutes the refereed proceedings of the following 9 international workshops: OTM Academy, OTM Industry Case Studies Program, Cloud and Trusted Computing, C&TC, Enterprise Integration, Interoperability, and Networking, EI2N, Industrial and Business Applications of Semantic Web Technologies, INBAST, Information Systems, om Distributed Environment, ISDE, Methods, Evaluation, Tools and Applications for the Creation and Consumption of Structured Data for the e-Society, META4eS, Mobile and Social Computing for collaborative interactions, MSC, and Ontology Content, OnToContent 2014. These workshops were held as associated events at OTM 2014, the federated conferences "On The Move Towards Meaningful Internet Systems and Ubiquitous Computing", in Amantea, Italy, in October 2014. The 56 full papers presented together with 8 short papers, 6 posters and 5 keynotes were carefully reviewed and selected from a total of 96 submissions. The focus of the workshops were on the following subjects models for interoperable infrastructures, applications, privacy and access control, reliability and performance, cloud and configuration management, interoperability in (System-of-)Systems, distributed information systems applications, architecture and process in distributed information system, distributed information system development and operational environment, ontology is use for eSociety, knowledge management and applications for eSociety, social networks and social services, social and mobile intelligence, and multimodal interaction and collaboration.
This textbook is a second edition of Evolutionary Algorithms for Solving Multi-Objective Problems, significantly expanded and adapted for the classroom. The various features of multi-objective evolutionary algorithms are presented here in an innovative and student-friendly fashion, incorporating state-of-the-art research. The book disseminates the application of evolutionary algorithm techniques to a variety of practical problems. It contains exhaustive appendices, index and bibliography and links to a complete set of teaching tutorials, exercises and solutions.
This book constitutes the thoroughly refereed post-conference proceedings of the 40th International Workshop on Graph-Theoretic Concepts in Computer Science, WG 2014, held in Nouan-le-Fuzelier, France, in June 2014. The 32 revised full papers presented were carefully reviewed and selected from 80 submissions. The book also includes two invited papers. The papers cover a wide range of topics in graph theory related to computer science, such as design and analysis of sequential, parallel, randomized, parameterized and distributed graph and network algorithms; structural graph theory with algorithmic or complexity applications; computational complexity of graph and network problems; graph grammars, graph rewriting systems and graph modeling; graph drawing and layouts; computational geometry; random graphs and models of the web and scale-free networks; and support of these concepts by suitable implementations and applications.
This introduction to the Java language integrates a discussion of object-oriented programming with the design and implementation of data structures. It covers the most important topics, including algorithm analysis; time and space complexities; Java built-in data structure classes; input and output, data, and access streams; and the persistency of data.
This monograph summarizes what we know about summarizing, and offers a detailed analysis of professional summarizing. A computer simulation of the cognitive processes in expert summarizers is offered on the accompanying CD-ROM.
This book constitutes the refereed proceedings of the 8th IAPR International Conference on Pattern Recognition in Bioinformatics, PRIB 2013, held in Nice, France, in June 2013. The 25 revised full papers presented were carefully reviewed and selected from 43 submissions. The papers are organized in topical sections on bio-molecular networks and pathway analysis; learning, classification, and clustering; data mining and knowledge discovery; protein: structure, function, and interaction; motifs, sites, and sequence analysis.
This book constitutes the refereed proceedings of the 9th Chinese Conference on Biometric Recognition, CCBR 2014, held in Shenyang, China, in November 2014. The 60 revised full papers presented were carefully reviewed and selected from among 90 submissions. The papers focus on face, fingerprint and palmprint, vein biometrics, iris and ocular biometrics, behavioral biometrics, application and system of biometrics, multi-biometrics and information fusion, other biometric recognition and processing.
This volume constitutes the refereed proceedings of two workshops: the International Cross-Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2014, and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, co-located with the International Conference on Availability, Reliability and Security, ARES 2014, held in Fribourg, Switzerland, in September 2014. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers deal with knowledge management, software security, mobile and social computing, enterprise information systems, homeland security and information processing.
This book constitutes the revised selected papers of the Second International Conference on Networked Systems, NETYS 2014, held in Marrakech, Morocco, in May 2014. The 20 full papers and the 6 short papers presented together with 2 keynotes were carefully reviewed and selected from 80 submissions. They address major topics such as multi-core architectures; concurrent and distributed algorithms; middleware environments; storage clusters; social networks; peer-to-peer networks; sensor networks; wireless and mobile networks; as well as privacy and security measures to protect such networked systems and data from attack and abuse.
The proceedings of the 5th International Workshop on Parallel Tools for High Performance Computing provide an overview on supportive software tools and environments in the fields of System Management, Parallel Debugging and Performance Analysis. In the pursuit to maintain exponential growth for the performance of high performance computers the HPC community is currently targeting Exascale Systems. The initial planning for Exascale already started when the first Petaflop system was delivered. Many challenges need to be addressed to reach the necessary performance. Scalability, energy efficiency and fault-tolerance need to be increased by orders of magnitude. The goal can only be achieved when advanced hardware is combined with a suitable software stack. In fact, the importance of software is rapidly growing. As a result, many international projects focus on the necessary software.
This book constitutes the refereed proceedings of the 13th
International Symposium on Privacy Enhancing Technologies, PET
2013, held in Bloomington, IN, USA, in July 2013.
This book constitutes the refereed proceedings of the 16th International Conference on Theory and Applications of Satisfiability Testing, SAT 2013, held in Helsinki, Finland in July 2013. The 21 regular papers, 5 short papers, and 5 tool papers presented together with 3 invited talks were carefully reviewed and selected from 71 submissions (850 regular, 15 short and 16 tool papers). The focus of the papers in on following topics: maximum satisfiability, encodings and applications, solver techniques and algorithms, clique-width and SAT, propositional proof complexity, parameterized complexity.
This book constitutes the refereed proceedings of six workshops of the 14th International Conference on Web-Age Information Management, WAIM 2013, held in Beidaihe, China, June 2013. The 37 revised full papers are organized in topical sections on the six following workshops: The International Workshop on Big Data Management on Emerging Hardware (HardBD 2013), the Second International Workshop on Massive Data Storage and Processing (MDSP 2013), the First International Workshop on Emergency Management in Big Data Age (BigEM 2013), the International Workshop on Trajectory Mining in Social Networks (TMSN 2013), the First International Workshop on Location-based Query Processing in Mobile Environments (LQPM 2013), and the First International Workshop on Big Data Management and Service (BDMS 2013).
This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs.
This book constitutes the refereed proceedings of the 7th
International Frontiers of Algorithmics Workshop, FAW 2013, and the
9th International Conference on Algorithmic Aspects in Information
and Management, AAIM 2013, jointly held in Dalian, China, in June
2013.
This book constitutes the refereed proceedings of the 6th International Conference on Collective Intelligence, ICCCI 2014, held in Seoul, Korea, in September 2014. The 70 full papers presented were carefully reviewed and selected from 205 submissions. They address topics such as knowledge integration, data mining for collective processing, fuzzy, modal and collective systems, nature inspired systems, language processing systems, social networks and semantic web, agent and multi-agent systems, classification and clustering methods, multi-dimensional data processing, Web systems, intelligent decision making, methods for scheduling, image and video processing, collective intelligence in web systems, computational swarm intelligence, cooperation and collective knowledge.
This book constitutes the refereed proceedings of the 5th International Conference on Decision and Game Theory for Security, GameSec 2014, held in Los Angeles, CA, USA, in November 2014. The 16 revised full papers presented together with 7 short papers were carefully reviewed and selected from numerous submissions. The covered topics cover multiple facets of cyber security that include: rationality of adversary, game-theoretic cryptographic techniques, vulnerability discovery and assessment, multi-goal security analysis, secure computation, economic-oriented security, and surveillance for security. Those aspects are covered in a multitude of domains that include networked systems, wireless communications, border patrol security, and control systems.
This book constitutes the proceedings of the 9th International Conference on Swarm Intelligence, held in Brussels, Belgium, in September 2014. This volume contains 17 full papers, 9 short papers, and 7 extended abstracts carefully selected out of 55 submissions. The papers cover empirical and theoretical research in swarm intelligence such as: behavioral models of social insects or other animal societies, ant colony optimization, particle swarm optimization, swarm robotics systems.
This book - in conjunction with the volumes LNCS 8588 and LNBI 8590 - constitutes the refereed proceedings of the 10th International Conference on Intelligent Computing, ICIC 2014, held in Taiyuan, China, in August 2014. The 85 papers of this volume were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections such as soft computing; artificial bee colony algorithms; unsupervised learning; kernel methods and supporting vector machines; machine learning; fuzzy theory and algorithms; image processing; intelligent computing in computer vision; intelligent computing in communication networks; intelligent image/document retrievals; intelligent data analysis and prediction; intelligent agent and Web applications; intelligent fault diagnosis; knowledge representation/reasoning; knowledge discovery and data mining; natural language processing and computational linguistics; next gen sequencing and metagenomics; intelligent computing in scheduling and engineering optimization; advanced modeling, control and optimization techniques for complex engineering systems; complex networks and their applications; time series forecasting and analysis using artificial neural networks; computer human interaction using multiple visual cues and intelligent computing; biometric system and security for intelligent computing.
This book constitutes the refereed proceedings of the First International Conference, AlCoB 2014, held in July 2014 in Tarragona, Spain. The 20 revised full papers were carefully reviewed and selected from 39 submissions. The scope of AlCoB includes topics of either theoretical or applied interest, namely: exact sequence analysis, approximate sequence analysis, pairwise sequence alignment, multiple sequence alignment, sequence assembly, genome rearrangement, regulatory motif finding, phylogeny reconstruction, phylogeny comparison, structure prediction, proteomics: molecular pathways, interaction networks, transcriptomics: splicing variants, isoform inference and quantification, differential analysis, next-generation sequencing: population genomics, metagenomics, metatranscriptomics, microbiome analysis, systems biology.
Asynchronous System-on-Chip Interconnect describes the use of an entirely asynchronous system-bus for the modular construction of integrated circuits. Industry is just awakening to the benefits of asynchronous design in avoiding the problems of clock-skew and multiple clock-domains, an din parallel with this is coming to grips with Intellectual Property (IP) based design flows which emphasise the need for a flexible interconnect strategy. In this book, John Bainbridge investigates the design of an asynchronous on-chip interconnect, looking at all the stages of the design from the choice of wiring layout, through asynchronous signalling protocols to the higher level problems involved in supporting split transactions. The MARBLE bus (the first asynchronous SoC bus) used in a commercial demonstrator chip containing a mixture of asynchronous and synchronous macrocells is used as a concrete example throughout the book.
This book constitutes the proceedings of the 18th International Conference on Developments in Language Theory, DLT 2014, held in Ekaterinburg, Russia, in August 2014. The 22 full papers and 5 short papers presented together with 3 invited talks were carefully reviewed and selected from 38 submissions. The papers are organized in topical subjects on Grammars, Acceptors and Transducers for Words, Trees and Graphs, Algebraic Theories of Automata, Algorithmic, Combinatorial and Algebraic Properties of Words and Languages, Variable Length Codes, Symbolic Dynamics, Cellular Automata, Polyominoes and Multidimensional Patterns, Decidability Questions, Image Manipulation and Compression, Efficient Text Algorithms, Relationships to Cryptography, Concurrency, Complexity Theory and Logic, Bio-Inspired Computing and Quantum Computing.
This book and its companion volume, LNCS vols. 7928 and 7929 constitute the proceedings of the 4th International Conference on Swarm Intelligence, ICSI 2013, held in Harbin, China in June 2013. The 129 revised full papers presented were carefully reviewed and selected from 268 submissions. The papers are organized in 22 cohesive sections covering all major topics of swarm intelligence research and developments. The following topics are covered in this volume: analysis of swarm intelligence based algorithms, particle swarm optimization, applications of particle swarm optimization algorithms, ant colony optimization algorithms, biogeography-based optimization algorithms, novel swarm-based search methods, bee colony algorithms, differential evolution, neural networks, fuzzy methods, evolutionary programming and evolutionary games. |
You may like...
Research Anthology on Architectures…
Information R Management Association
Hardcover
R12,630
Discovery Miles 126 300
Insects - Functional Morphology…
Hamed Rajabi, Jianing Wu, …
Hardcover
Research Anthology on Usage and…
Information R Management Association
Hardcover
R17,615
Discovery Miles 176 150
Mass Production of Beneficial Organisms…
Juan A Morales-Ramos, M Guadalupe Rojas, …
Hardcover
R3,020
Discovery Miles 30 200
Principles of Security and Trust - 7th…
Lujo Bauer, Ralf Kusters
Hardcover
R1,547
Discovery Miles 15 470
Sustainable Biodiesel - Real World…
Meisam Tabatabaei, Abdul-Sattar Nizami
Paperback
R3,795
Discovery Miles 37 950
|