![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > General theory of computing > Data structures
These contributions, written by the foremost international researchers and practitioners of Genetic Programming (GP), explore the synergy between theoretical and empirical results on real-world problems, producing a comprehensive view of the state of the art in GP. Topics in this volume include: evolutionary constraints, relaxation of selection mechanisms, diversity preservation strategies, flexing fitness evaluation, evolution in dynamic environments, multi-objective and multi-modal selection, foundations of evolvability, evolvable and adaptive evolutionary operators, foundation of injecting expert knowledge in evolutionary search, analysis of problem difficulty and required GP algorithm complexity, foundations in running GP on the cloud - communication, cooperation, flexible implementation, and ensemble methods. Additional focal points for GP symbolic regression are: (1) The need to guarantee convergence to solutions in the function discovery mode; (2) Issues on model validation; (3) The need for model analysis workflows for insight generation based on generated GP solutions - model exploration, visualization, variable selection, dimensionality analysis; (4) Issues in combining different types of data. Readers will discover large-scale, real-world applications of GP to a variety of problem domains via in-depth presentations of the latest and most significant results.
This book constitutes the refereed proceedings of the Third International Conference, TPNC 2014, held in Granada, Spain, in December 2014. The 22 revised full papers presented in this book were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on nature-inspired models of computation; synthesizing nature by means of computation; nature-inspired materials; and information processing in nature.
I want to express my sincere thanks to all authors who submitted research papers to support the Third IFIP International Conference on Computer and Computing Te- nologies in Agriculture and the Third Symposium on Development of Rural Infor- tion (CCTA 2009) held in China, during October 14-17, 2009. This conference was hosted by the CICTA (EU-China Centre for Information & Communication Technologies, China Agricultural University), China National En- neering Research Center for Information Technology in Agriculture, Asian Conf- ence on Precision Agriculture, International Federation for Information Processing, Chinese Society of Agricultural Engineering, Beijing Society for Information Te- nology in Agriculture, and the Chinese Society for Agricultural Machinery. The pla- num sponsor includes the Ministry of Science and Technology of China, Ministry of Agriculture of China, Ministry of Education of China, among others. The CICTA (EU-China Centre for Information & Communication Technologies, China Agricultural University) focuses on research and development of advanced and practical technologies applied in agriculture and on promoting international communi- tion and cooperation. It has successfully held three International Conferences on C- puter and Computing Technologies in Agriculture, namely CCTA 2007, CCTA 2008 and CCTA 2009. Sustainable agriculture is the focus of the whole world currently, and therefore the application of information technology in agriculture is becoming more and more - portant. 'Informatized agriculture' has been sought by many countries recently in order to scientifically manage agriculture to achieve low costs and high incomes.
The two-volume set LNAI 8856 and LNAI 8857 constitutes the proceedings of the 13th Mexican International Conference on Artificial Intelligence, MICAI 2014, held in Tuxtla, Mexico, in November 2014. The total of 87 papers plus 1 invited talk presented in these proceedings were carefully reviewed and selected from 348 submissions. The first volume deals with advances in human-inspired computing and its applications. It contains 44 papers structured into seven sections: natural language processing, natural language processing applications, opinion mining, sentiment analysis, and social network applications, computer vision, image processing, logic, reasoning, and multi-agent systems, and intelligent tutoring systems. The second volume deals with advances in nature-inspired computation and machine learning and contains also 44 papers structured into eight sections: genetic and evolutionary algorithms, neural networks, machine learning, machine learning applications to audio and text, data mining, fuzzy logic, robotics, planning, and scheduling, and biomedical applications.
This book constitutes the refereed proceedings of the 25th International Symposium on Algorithms and Computation, ISAAC 2014, held in Jeonju, Korea, in December 2014. The 60 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 171 submissions for inclusion in the book. The focus of the volume in on the following topics: computational geometry, combinatorial optimization, graph algorithms: enumeration, matching and assignment, data structures and algorithms, fixed-parameter tractable algorithms, scheduling algorithms, computational complexity, computational complexity, approximation algorithms, graph theory and algorithms, online and approximation algorithms, and network and scheduling algorithms.
This book introduces the first programming language for which average-case time analysis of its programs is guaranteed to be modular. The main time measure currently used for real-time languages (worst-case time) is well-known not to be modular in general, which makes average-case analysis notoriously difficult. Schellekens includes sample programs as well as derivations of the average-case time of these programs to illustrate this radically different approach.
The two-volume set LNAI 8856 and LNAI 8857 constitutes the proceedings of the 13th Mexican International Conference on Artificial Intelligence, MICAI 2014, held in Tuxtla, Mexico, in November 2014. The total of 87 papers plus 1 invited talk presented in these proceedings were carefully reviewed and selected from 348 submissions. The first volume deals with advances in human-inspired computing and its applications. It contains 44 papers structured into seven sections: natural language processing, natural language processing applications, opinion mining, sentiment analysis, and social network applications, computer vision, image processing, logic, reasoning, and multi-agent systems, and intelligent tutoring systems. The second volume deals with advances in nature-inspired computation and machine learning and contains also 44 papers structured into eight sections: genetic and evolutionary algorithms, neural networks, machine learning, machine learning applications to audio and text, data mining, fuzzy logic, robotics, planning, and scheduling, and biomedical applications.
This book constitutes the proceedings of the 41st International Conference on Current Trends in Theory and Practice of Computer Science held in Pec pod Snezkou, Czech Republic, during January 24-29, 2015. The book features 8 invited talks and 42 regular papers which were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections named: foundations of computer science; software and Web engineering; data, information, and knowledge engineering; and cryptography, security, and verification.
This thesis discusses the privacy issues in speech-based applications such as biometric authentication, surveillance, and external speech processing services. Author Manas A. Pathak presents solutions for privacy-preserving speech processing applications such as speaker verification, speaker identification and speech recognition. The author also introduces some of the tools from cryptography and machine learning and current techniques for improving the efficiency and scalability of the presented solutions. Experiments with prototype implementations of the solutions for execution time and accuracy on standardized speech datasets are also included in the text. Using the framework proposed may now make it possible for a surveillance agency to listen for a known terrorist without being able to hear conversation from non-targeted, innocent civilians.
Data driven methods have long been used in Automatic Speech Recognition (ASR) and Text-To-Speech (TTS) synthesis and have more recently been introduced for dialogue management, spoken language understanding, and Natural Language Generation. Machine learning is now present "end-to-end" in Spoken Dialogue Systems (SDS). However, these techniques require data collection and annotation campaigns, which can be time-consuming and expensive, as well as dataset expansion by simulation. In this book, we provide an overview of the current state of the field and of recent advances, with a specific focus on adaptivity.
This book is nothing less than a complete and comprehensive survey of the state-of-the-art of terrorism informatics. It covers the application of advanced methodologies and information fusion and analysis. It also lays out techniques to acquire, integrate, process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The book details three major areas of terrorism research: prevention, detection, and established governmental responses to terrorism. It systematically examines the current and ongoing research, including recent case studies and application of terrorism informatics techniques. The coverage then presents the critical and relevant social/technical areas to terrorism research including social, privacy, data confidentiality, and legal challenges.
This book constitutes the proceedings of the Third International Workshop on Foundational and Practical Aspects of Resource Analysis, FOPARA 2013, held in Bertinoro, Italy, in August 2013. The 9 papers presented in this volume were carefully reviewed and selected from 12 submissions. They deal with traditional approaches to complexity analysis, differential privacy, and probabilistic analysis of programs.
This book defines the application of Information Technology's systematic and automated knowledge mapping methodology to collect, analyze and report nanotechnology research on a global basis. The result of these analyses is be a systematic presentation of the state of the art of nanotechnology, which will include basic analysis, content analysis, and citation network analysis of comprehensive nanotechnology findings across technology domains, inventors, institutions, and countries.
Network Science is the emerging field concerned with the study of large, realistic networks. This interdisciplinary endeavor, focusing on the patterns of interactions that arise between individual components of natural and engineered systems, has been applied to data sets from activities as diverse as high-throughput biological experiments, online trading information, smart-meter utility supplies, and pervasive telecommunications and surveillance technologies. This unique text/reference provides a fascinating insight into the state of the art in network science, highlighting the commonality across very different areas of application and the ways in which each area can be advanced by injecting ideas and techniques from another. The book includes contributions from an international selection of experts, providing viewpoints from a broad range of disciplines. It emphasizes networks that arise in nature-such as food webs, protein interactions, gene expression, and neural connections-and in technology-such as finance, airline transport, urban development and global trade. Topics and Features: begins with a clear overview chapter to introduce this interdisciplinary field; discusses the classic network science of fixed connectivity structures, including empirical studies, mathematical models and computational algorithms; examines time-dependent processes that take place over networks, covering topics such as synchronisation, and message passing algorithms; investigates time-evolving networks, such as the World Wide Web and shifts in topological properties (connectivity, spectrum, percolation); explores applications of complex networks in the physical and engineering sciences, looking ahead to new developments in the field. Researchers and professionals from disciplines as varied as computer science, mathematics, engineering, physics, chemistry, biology, ecology, neuroscience, epidemiology, and the social sciences will all benefit from this topical and broad overview of current activities and grand challenges in the unfolding field of network science.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Activity Monitoring by Multiple Distributed Sensing, AMMDS 2014, held in Stockholm, Sweden, in August 2014, as a satellite event of ICPR 2014, the 22nd International Conference on Pattern Recognition. The 9 revised full papers included in the volume investigate the challenges that arise when distributed sensor networks are used to track, monitor, and understand the activity, intent, and motives of human beings. Application areas include human-computer interaction, user interface design, robot learning, and surveillance.
The two volumes LNCS 8805 and 8806 constitute the thoroughly refereed post-conference proceedings of 18 workshops held at the 20th International Conference on Parallel Computing, Euro-Par 2014, in Porto, Portugal, in August 2014. The 100 revised full papers presented were carefully reviewed and selected from 173 submissions. The volumes include papers from the following workshops: APCI&E (First Workshop on Applications of Parallel Computation in Industry and Engineering - BigDataCloud (Third Workshop on Big Data Management in Clouds) - DIHC (Second Workshop on Dependability and Interoperability in Heterogeneous Clouds) - FedICI (Second Workshop on Federative and Interoperable Cloud Infrastructures) - Hetero Par (12th International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogeneous Platforms) - HiBB (5th Workshop on High Performance Bioinformatics and Biomedicine) - LSDVE (Second Workshop on Large Scale Distributed Virtual Environments on Clouds and P2P) - MuCoCoS (7th International Workshop on Multi-/Many-core Computing Systems) - OMHI (Third Workshop on On-chip Memory Hierarchies and Interconnects) - PADAPS (Second Workshop on Parallel and Distributed Agent-Based Simulations) - PROPER (7th Workshop on Productivity and Performance) - Resilience (7th Workshop on Resiliency in High Performance Computing with Clusters, Clouds, and Grids) - REPPAR (First International Workshop on Reproducibility in Parallel Computing) - ROME (Second Workshop on Runtime and Operating Systems for the Many Core Era) - SPPEXA (Workshop on Software for Exascale Computing) - TASUS (First Workshop on Techniques and Applications for Sustainable Ultrascale Computing Systems) - UCHPC (7th Workshop on Un Conventional High Performance Computing) and VHPC (9th Workshop on Virtualization in High-Performance Cloud Computing.
This book constitutes the refereed proceedings of the 22nd International Symposium on String Processing and Information Retrieval, SPIRE 2015, held in London, UK, in September 2015. The 28 full and 6 short papers included in this volume were carefully reviewed and selected from 90 submissions. The papers cover research in all aspects of string processing, information retrieval, computational biology, pattern matching, semi-structured data, and related applications.
This book is intended to support ISPF application programmers to become professional in the smart programming of ISPF applications using the REXX language. The contents are presented in a modular manner to suit reading with heterogeneous ISPF programming knowledge. The following topics are covered: Introduction to the programming language REXX as well as to ISPF programming, data processing in ISPF applications, use of messages, panels, skeletons, tables, ISPF variables and an introduction to creating and applying edit macros. Each theme is vividly illustrated by programming examples. The Smart ISPF Utilities contain some very useful programming aids that are often useful when programming ISPF applications. The book serves as a textbook as well as a manual for daily work. Many cross-references are included as well as an extensive index. Moreover, the author gives many helpful hints and tips on smart ISPF programming practices. The Smart ISPF Utilities contain many useful programming aids.
Implicit objects have gained increasing importance in geometric modeling, visualisation, animation, and computer graphics, because their geometric properties provide a good alternative to traditional parametric objects. This book presents the mathematics, computational methods and data structures, as well as the algorithms needed to render implicit curves and surfaces, and shows how implicit objects can easily describe smooth, intricate, and articulatable shapes, and hence why they are being increasingly used in graphical applications. Divided into two parts, the first introduces the mathematics of implicit curves and surfaces, as well as the data structures suited to store their sampled or discrete approximations, and the second deals with different computational methods for sampling implicit curves and surfaces, with particular reference to how these are applied to functions in 2D and 3D spaces.
This book constitutes the thoroughly refereed post-workshop proceedings of the 18th International Workshop on Security Protocols, held in Cambridge, UK, in March 2010. After an introduction the volume presents 16 revised papers and one abstract, each followed by a revised transcript of the discussion ensuing the presentation at the event. The theme of this year's workshop was "Virtually Perfect Security".
The Workshop on the Economics of Information Security was established in 2002 to bring together computer scientists and economists to understand and improve the poor state of information security practice. WEIS was borne out of a realization that security often fails for non-technical reasons. Rather, the incentives of both - fender and attacker must be considered. Earlier workshops have answered questions ranging from?nding optimal levels of security investement to understanding why privacy has been eroded. In the process, WEIS has attracted participation from the diverse?elds such as law, management and psychology. WEIS has now established itself as the leading forum for interdisciplinary scholarship on information security. The eigth installment of the conference returned to the United Kingdom, hosted byUniversityCollegeLondononJune24-25,2009.Approximately100researchers, practitioners and government of?cials from across the globe convened in London to hear presentations from authors of 21 peer-reviewed papers, in addition to a panel and keynote lectures from Hal Varian (Google), Bruce Schneier (BT Co- terpane), Martin Sadler (HP Labs), and Robert Coles (Merrill Lynch). Angela Sasse and David Pym chaired the conference, while Christos Ioannidis and Tyler Moore chaired the program committee.
? DoesP=NP. In just ?ve symbols Dick Karp -in 1972-captured one of the deepest and most important questions of all time. When he ?rst wrote his famous paper, I think it's fair to say he did not know the depth and importance of his question. Now over three decades later, we know P=NP is central to our understanding of compu- tion, it is a very hard problem, and its resolution will have potentially tremendous consequences. This book is a collection of some of the most popular posts from my blog- Godel Lost Letter andP=NP-which I started in early 2009. The main thrust of the blog, especially when I started, was to explore various aspects of computational complexity around the famousP=NP question. As I published posts I branched out and covered additional material, sometimes a timely event, sometimes a fun idea, sometimes a new result, and sometimes an old result. I have always tried to make the posts readable by a wide audience, and I believe I have succeeded in doing this.
This book describes a complete revolution in software engineering based on complexity science through the establishment of NSE - Nonlinear Software Engineering paradigm which complies with the essential principles of complexity science, including the Nonlinearity principle, the Holism principle, the Complexity Arises From Simple Rules principle, the Initial Condition Sensitivity principle, the Sensitivity to Change principle, the Dynamics principle, the Openness principle, the Self-organization principle, and the Self-adaptation principle. The aims of this book are to offer revolutionary solutions to solve the critical problems existing with the old-established software engineering paradigm based on linear thinking and simplistic science complied with the superposition principle, and make it possible tohelp software development organizations double their productivity, halve their cost, and remove 99% to 99.99% of the defects in their software products, and efficiently handle software complexity, conformity, visibility, and changeability. It covers almost all areas in software engineering. The tools NSE_CLICK- an automatic acceptance testing platform for outsourcing (or internally developed) C/C++ products, and NSE_CLICK_J - an automatic acceptance testing platform for outsourcing (or internally developed) Java products are particularly designed for non-technical readers to view/review how the acceptance testing of a software product developed with NSE can be performed automatically, and how the product developed with NSE is truly maintainable at the customer site.
This book constitutes the refereed proceedings of the 19th International Conference on Technologies and Applications of Artificial Intelligence, held in Taipei, Taiwan, in November 2014. The 23 revised full papers, 3 short papers, and 8 workshop papers presented at the international track of the conference were carefully reviewed and selected from overall 93 submissions to the international track, domestic track, and international workshops for inclusion in this volume. The papers feature original research results and practical development experiences among researchers and application developers from the many AI related areas including machine learning, data mining, statistics, computer vision, web intelligence, information retrieval, and computer games.
Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of Communications and Multimedia Security. This state-of-the-art volume presents the proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, September 2004, in Windermere, UK. The papers presented here represent the very latest developments in security research from leading people in the field. The papers explore a wide variety of subjects including privacy protection and trust negotiation, mobile security, applied cryptography, and security of communication protocols. Of special interest are several papers which addressed security in the Microsoft .Net architecture, and the threats that builders of web service applications need to be aware of. The papers were a result of research sponsored by Microsoft at five European University research centers. This collection will be important not only for multimedia security experts and researchers, but also for all teachers and administrators interested in communications security. |
![]() ![]() You may like...
Network Flows - Pearson New…
Ravindra Ahuja, Thomas Magnanti, …
Paperback
R2,679
Discovery Miles 26 790
Data Abstraction and Problem Solving…
Janet Prichard, Frank Carrano
Paperback
R2,421
Discovery Miles 24 210
Python Programming for Computations…
Computer Language
Hardcover
|