0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (6)
  • R250 - R500 (59)
  • R500+ (5,338)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > General theory of computing > Data structures

Structure and Evolution (Hardcover): Binxing Fang, Yan Jia Structure and Evolution (Hardcover)
Binxing Fang, Yan Jia; Contributions by Publishing House of Electronics Industry
R2,759 R2,170 Discovery Miles 21 700 Save R589 (21%) Ships in 18 - 22 working days

The three volume set provides a systematic overview of theories and technique on social network analysis. Volume 1 of the set mainly focuses on the structure characteristics, the modeling, and the evolution mechanism of social network analysis. Techniques and approaches for virtual community detection are discussed in detail as well. It is an essential reference for scientist and professionals in computer science.

Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part I (Paperback, 2013 ed.)
Kazue Sako, Palash Sarkar
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday (Paperback, 2013):... Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday (Paperback, 2013)
Marc Fischlin, Stefan Katzenbeisser
R1,295 Discovery Miles 12 950 Ships in 18 - 22 working days

Johannes Buchmann is internationally recognized as one of the leading figures in areas of computational number theory, cryptography and information security. He has published numerous scientific papers and books spanning a very wide spectrum of interests; besides R&D he also fulfilled lots of administrative tasks for instance building up and directing his research group CDC at Darmstadt, but he also served as the Dean of the Department of Computer Science at TU Darmstadt and then went on to become Vice President of the university for six years (2001-2007). This festschrift, published in honor of Johannes Buchmann on the occasion of his 60th birthday, contains contributions by some of his colleagues, former students and friends. The papers give an overview of Johannes Buchmann's research interests, ranging from computational number theory and the hardness of cryptographic assumptions to more application-oriented topics such as privacy and hardware security. With this book we celebrate Johannes Buchmann's vision and achievements.

Numerical Analysis and Its Applications - 5th International Conference, NAA 2012, Lozenetz, Bulgaria, June 15-20, 2012, Revised... Numerical Analysis and Its Applications - 5th International Conference, NAA 2012, Lozenetz, Bulgaria, June 15-20, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Ivan Dimov, Istvan Farago, Lubin Vulkov
R1,486 Discovery Miles 14 860 Ships in 18 - 22 working days

This book constitutes thoroughly revised selected papers of the 5th International Conference on Numerical Analysis and ItsApplications, NAA 2012, held in Lozenetz, Bulgaria, in June 2012. The 65 revised papers presented were carefully reviewed and selected from various submissions. The papers cover a broad area of topics of interest such as numerical approximation and computational geometry; numerical linear algebra and numerical solution of transcendental equation; numerical methods for differential equations; numerical stochastics, numerical modeling; and high performance scientific computing."

WALCOM: Algorithms and Computation - 7th International Workshop, WALCOM 2013, Kharagpur, India, February 14-16, 2013,... WALCOM: Algorithms and Computation - 7th International Workshop, WALCOM 2013, Kharagpur, India, February 14-16, 2013, Proceedings (Paperback, 2013 ed.)
Subir Kumar Ghosh, Takeshi Tokuyama
R1,426 Discovery Miles 14 260 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Workshop on Algorithms and Computation, WALCOM 2013, held in Kharagpur, India, in February 2013. The 29 full papers presented were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections on computational geometry, approximation and randomized algorithms, parallel and distributed computing, graph algorithms, complexity and bounds, and graph drawing.

Smart Card Research and Advanced Applications - IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced... Smart Card Research and Advanced Applications - IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications September 20-22, 2000, Bristol, United Kingdom (Paperback, Softcover reprint of the original 1st ed. 2000)
Josep Domingo-Ferrer, David Chan, Anthony Watson
R5,173 Discovery Miles 51 730 Ships in 18 - 22 working days

Smart cards or IC cards offer a huge potential for information processing purposes. The portability and processing power of IC cards allow for highly secure conditional access and reliable distributed information processing. IC cards that can perform highly sophisticated cryptographic computations are already available. Their application in the financial services and telecom industries are well known. But the potential of IC cards go well beyond that. Their applicability in mainstream Information Technology and the Networked Economy is limited mainly by our imagination; the information processing power that can be gained by using IC cards remains as yet mostly untapped and is not well understood. Here lies a vast uncovered research area which we are only beginning to assess, and which will have a great impact on the eventual success of the technology. The research challenges range from electrical engineering on the hardware side to tailor-made cryptographic applications on the software side, and their synergies. This volume comprises the proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), which was sponsored by the International Federation for Information Processing (IFIP) and held at the Hewlett-Packard Labs in the United Kingdom in September 2000. CARDIS conferences are unique in that they bring together researchers who are active in all aspects of design of IC cards and related devices and environments, thus stimulating synergy between different research communities from both academia and industry. This volume presents the latest advances in smart card research and applications, and will be essential reading for smart card developers, smart card application developers, and computer science researchers involved in computer architecture, computer security, and cryptography.

Formal Methods for Open Object-Based Distributed Systems - IFIP TC6 / WG6.1 Third International Conference on Formal Methods... Formal Methods for Open Object-Based Distributed Systems - IFIP TC6 / WG6.1 Third International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS), February 15-18, 1999, Florence, Italy (Paperback, Softcover reprint of the original 1st ed. 1999)
Paolo Ciancarini, Alessandro Fantechi, Roberto Gorrieri
R5,186 Discovery Miles 51 860 Ships in 18 - 22 working days

Formal Methods for Open Object-Based Distributed Systems presents the leading edge in several related fields, specifically object-orientated programming, open distributed systems and formal methods for object-oriented systems. With increased support within industry regarding these areas, this book captures the most up-to-date information on the subject. Many topics are discussed, including the following important areas: object-oriented design and programming; formal specification of distributed systems; open distributed platforms; types, interfaces and behaviour; formalisation of object-oriented methods. This volume comprises the proceedings of the International Workshop on Formal Methods for Open Object-based Distributed Systems (FMOODS), sponsored by the International Federation for Information Processing (IFIP) which was held in Florence, Italy, in February 1999. Formal Methods for Open Object-Based Distributed Systems is suitable as a secondary text for graduate-level courses in computer science and telecommunications, and as a reference for researchers and practitioners in industry, commerce and government.

Preserving Privacy in Data Outsourcing (Paperback, 2011 ed.): Sara Foresti Preserving Privacy in Data Outsourcing (Paperback, 2011 ed.)
Sara Foresti
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Foreword by Pierangela Samarati

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data; it allows the data owner to outsource not only the data but the security policy itself. The last section of this book investigates the problem of executing queries over possible data distributed at different servers. Case Studies will be provided.

About this book:

Exclusively focuses on addressing protection of confidential information in the emerging data outsourcing scenarios.

Presents relevant and critical novel problems and novel techniques, a precious reference point to students, researchers, and developers in this field.

Provides a comprehensive overview of the data protection problem in outsourcing scenarios, as well as a rigorous analysis and formalization of the problem and solutions to it.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Focused Retrieval of Content and Structure - 10th International Workshop of the Initiative for the Evaluation of XML Retrieval,... Focused Retrieval of Content and Structure - 10th International Workshop of the Initiative for the Evaluation of XML Retrieval, INEX 2011, Saarbrucken, Germany, December 12-14, 2011, Revised and Selected Papers (Paperback, 2012 ed.)
Shlomo Geva, Jaap Kamps, Ralf Schenkel
R1,423 Discovery Miles 14 230 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop of the Initiative for the Evaluation of XML Retrieval, INEX 2011, held in Saarbrucken, Germany, in December 2011. The 33 revised full papers presented were carefully reviewed and selected for presentation at the workshop from 36 submissions. The papers are organized in 5 research tracks on book and social search, Xdata centric, question answering, relevance feedback, and snippet retrieval.

Combinatorial Algorithms - 23rd International Workshop, IWOCA 2012, Krishnankoil, India, July 19-21, 2012, Revised Selected... Combinatorial Algorithms - 23rd International Workshop, IWOCA 2012, Krishnankoil, India, July 19-21, 2012, Revised Selected Papers (Paperback, 2012 ed.)
W. F. Symth, Subramanian Arumugam
R1,413 Discovery Miles 14 130 Ships in 18 - 22 working days

This book constitutes the thoroughly referred post-workshop proceedings of the 23rd International Workshop on Combinatorial Algorithms, IWOCA 2012, held in Krishnankoil, Tamil Nadu, India, in July 2012. The 32 revised full papers presented were carefully reviewed and selected from a total of 88 submissions. The papers are organized in topical sections in algorithms and data Structures, applications (including Bioinformatics, Networking, etc.), combinatorics of words and strings, combinatorial optimization, combinatorial enumeration, decompositions and combinatorial designs, complexity theory (structural and computational), computational biology and graph theory and combinatorics submissions.

Research Advances in Database and Information Systems Security - IFIP TC11 WG11.3 Thirteenth Working Conference on Database... Research Advances in Database and Information Systems Security - IFIP TC11 WG11.3 Thirteenth Working Conference on Database Security July 25-28, 1999, Seattle, Washington, USA (Paperback, Softcover reprint of the original 1st ed. 2000)
Vijay Atluri, John Hale
R2,670 Discovery Miles 26 700 Ships in 18 - 22 working days

Computer technology evolves at a rate that challenges companies to maintain appropriate security for their enterprises. With the rapid growth in Internet and www facilities, database and information systems security remains a key topic in businesses and in the public sector, with implications for the whole of society. Research Advances in Database and Information Systems Security covers issues related to security and privacy of information in a wide range of applications, including: * Critical Infrastructure Protection; * Electronic Commerce; * Information Assurance; * Intrusion Detection; * Workflow; * Policy Modeling; * Multilevel Security; * Role-Based Access Control; * Data Mining; * Data Warehouses; * Temporal Authorization Models; * Object-Oriented Databases. This book contains papers and panel discussions from the Thirteenth Annual Working Conference on Database Security, organized by the International Federation for Information Processing (IFIP) and held July 25-28, 1999, in Seattle, Washington, USA.Research Advances in Database and Information Systems Security provides invaluable reading for faculty and advanced students as well as for industrial researchers and practitioners engaged in database security research and development.

Computational Science and Its Applications -- ICCSA 2013 - 13th International Conference, ICCSA 2013, Ho Chi Minh City,... Computational Science and Its Applications -- ICCSA 2013 - 13th International Conference, ICCSA 2013, Ho Chi Minh City, Vietnam, June 24-27, 2013, Proceedings, Part V (Paperback, 2013 ed.)
Beniamino Murgante, Sanjay Misra, Maurizio Carlini, Carmelo Maria Torre, Hong-Quang Nguyen, …
R1,516 Discovery Miles 15 160 Ships in 18 - 22 working days

The five-volume set LNCS 7971-7975 constitutes the refereed proceedings of the 13th International Conference on Computational Science and Its Applications, ICCSA 2013, held in Ho Chi Minh City, Vietnam in June 2013. The 248 revised papers presented in five tracks and 33 special sessions and workshops were carefully reviewed and selected. The 46 papers included in the five general tracks are organized in the following topical sections: computational methods, algorithms and scientific applications; high-performance computing and networks; geometric modeling, graphics and visualization; advanced and emerging applications; and information systems and technologies. The 202 papers presented in special sessions and workshops cover a wide range of topics in computational sciences ranging from computational science technologies to specific areas of computational sciences such as computer graphics and virtual reality.

Trends and Topics in Computer Vision - ECCV 2010 Workshops, Heraklion, Crete, Greece, September 10-11, 2010, Revised Selected... Trends and Topics in Computer Vision - ECCV 2010 Workshops, Heraklion, Crete, Greece, September 10-11, 2010, Revised Selected Papers, Part I (Paperback, 2012 ed.)
Kiriakos N. Kutulakos
R1,431 Discovery Miles 14 310 Ships in 18 - 22 working days

The two volumes LNCS 6553 and 6554 constitute the refereed post-proceedings of 7 workshops held in conjunction with the 11th European Conference on Computer Vision, held in Heraklion, Crete, Greece in September 2010. The 62 revised papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The first volume contains 26 revised papers and 2 invited talks selected from the following workshops: First International Workshop on Parts and Attributes; Third Workshop on Human Motion Understanding, Modeling, Capture and Animation; and International Workshop on Sign, Gesture and Activity (SGA 2010).

Middleware 2012 - ACM/IFIP/USENIX 13th International Middleware Conference, Montreal, Canada, December 3-7, 2012. Proceedings... Middleware 2012 - ACM/IFIP/USENIX 13th International Middleware Conference, Montreal, Canada, December 3-7, 2012. Proceedings (Paperback, 2012 ed.)
Priya Narasimhan, Peter Triantafillou
R1,467 Discovery Miles 14 670 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 13th International Middleware Conference, held in Montreal, Canada, in December 2012. The 24 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on mobile middleware; tracing and diagnosis; architecture and performance; publish/subscribe middleware; and big-data and cloud computing; availability, security and privacy.

Evolvable Components - From Theory to Hardware Implementations (Paperback, Softcover reprint of the original 1st ed. 2004):... Evolvable Components - From Theory to Hardware Implementations (Paperback, Softcover reprint of the original 1st ed. 2004)
Lukas Sekanina
R1,385 Discovery Miles 13 850 Ships in 18 - 22 working days

At the beginning of the 1990s research started in how to combine soft comput ing with reconfigurable hardware in a quite unique way. One of the methods that was developed has been called evolvable hardware. Thanks to evolution ary algorithms researchers have started to evolve electronic circuits routinely. A number of interesting circuits - with features unreachable by means of con ventional techniques - have been developed. Evolvable hardware is quite pop ular right now; more than fifty research groups are spread out over the world. Evolvable hardware has become a part of the curriculum at some universi ties. Evolvable hardware is being commercialized and there are specialized conferences devoted to evolvable hardware. On the other hand, surprisingly, we can feel the lack of a theoretical background and consistent design methodology in the area. Furthermore, it is quite difficult to implement really innovative and practically successful evolvable systems using contemporary digital reconfigurable technology."

Computational Intelligence and Information Technology - First International Conference, CIIT 2011, Pune, India, November 7-8,... Computational Intelligence and Information Technology - First International Conference, CIIT 2011, Pune, India, November 7-8, 2011. Proceedings (Paperback, 2012)
Vinu V. Das, Nessy Thankachan
R2,817 Discovery Miles 28 170 Ships in 18 - 22 working days

This book constitutes the proceedings of the First International Conference on Computational Intelligence and Information Technology, CIIT 2011, held in Pune, India, in November 2011. The 58 revised full papers, 67 revised short papers, and 32 poster papers presented were carefully reviewed and selected from 483 initial submissions. The papers are contributed by innovative academics and industrial experts in the field of computer science, information technology, computational engineering, mobile communication and security and offer a stage to a common forum, where a constructive dialog on theoretical concepts, practical ideas and results of the state of the art can be developed.

Distributed Computing and Networking - 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings... Distributed Computing and Networking - 14th International Conference, ICDCN 2013, Mumbai, India, January 3-6, 2013. Proceedings (Paperback, 2013 ed.)
Davide Frey, Michel Raynal, Saswati Sarkar, Rudrapatna K. Shyamasundar, Prasun Sinha
R1,460 Discovery Miles 14 600 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Conference on Distributed Computing and Networking, ICDCN 2013, held in Mumbai, India, during January 3-6, 2013. The 27 revised full papers, 5 short papers presented together with 7 poster papers were carefully reviewed and selected from 149 submissions. The papers cover topics such as distributed algorithms and concurrent data structures; integration of heterogeneous wireless and wired networks; distributed operating systems; internetworking protocols and internet applications; distributed database systems; mobile and pervasive computing, context-aware distributed systems; embedded distributed systems; next generation and converged network architectures; experiments and performance evaluation of distributed systems; overlay and peer-to-peer networks and services; fault-tolerance, reliability, and availability; home networking and services; multiprocessor and multi-core architectures and algorithms; resource management and quality of service; self-organization, self-stabilization, and autonomic computing; network security and privacy; high performance computing, grid computing, and cloud computing; energy-efficient networking and smart grids; security, cryptography, and game theory in distributed systems; sensor, PAN and ad-hoc networks; and traffic engineering, pricing, network management.

Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers (Paperback, 2012... Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers (Paperback, 2012 ed.)
Bruce Christianson, James Malcolm, Frank Stajano, Jonathan Anderson
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security Protocols, held in Cambridge, UK, in April 2012. Following the tradition of this workshop series, each paper war revised by the authors to incorporate ideas from the workshop, and is followed in these proceedings by an edited transcription of the presentation and ensuing discussion. The volume contains 14 papers with their transcriptions as well as an introduction, i.e. 29 contributions in total. The theme of the workshop was "Bringing protocols to life."

Cellular Automata Transforms - Theory and Applications in Multimedia Compression, Encryption, and Modeling (Paperback,... Cellular Automata Transforms - Theory and Applications in Multimedia Compression, Encryption, and Modeling (Paperback, Softcover reprint of the original 1st ed. 2000)
Olurinde Lafe
R3,984 Discovery Miles 39 840 Ships in 18 - 22 working days

Cellular Automata Transforms describes a new approach to using the dynamical system, popularly known as cellular automata (CA), as a tool for conducting transforms on data. Cellular automata have generated a great deal of interest since the early 1960s when John Conway created the `Game of Life'. This book takes a more serious look at CA by describing methods by which information building blocks, called basis functions (or bases), can be generated from the evolving states. These information blocks can then be used to construct any data. A typical dynamical system such as CA tend to involve an infinite possibilities of rules that define the inherent elements, neighborhood size, shape, number of states, and modes of association, etc. To be able to build these building blocks an elegant method had to be developed to address a large subset of these rules. A new formula, which allows for the definition a large subset of possible rules, is described in the book. The robustness of this formula allows searching of the CA rule space in order to develop applications for multimedia compression, data encryption and process modeling. Cellular Automata Transforms is divided into two parts. In Part I the fundamentals of cellular automata, including the history and traditional applications are outlined. The challenges faced in using CA to solve practical problems are described. The basic theory behind Cellular Automata Transforms (CAT) is developed in this part of the book. Techniques by which the evolving states of a cellular automaton can be converted into information building blocks are taught. The methods (including fast convolutions) by which forward and inverse transforms of any data can be achieved are also presented. Part II contains a description of applications of CAT. Chapter 4 describes digital image compression, audio compression and synthetic audio generation, three approaches for compressing video data. Chapter 5 contains both symmetric and public-key implementation of CAT encryption. Possible methods of attack are also outlined. Chapter 6 looks at process modeling by solving differential and integral equations. Examples are drawn from physics and fluid dynamics.

Quantum Interaction - 6th International Symposium, QI 2012, Paris, June 27-29, 2012, Revised Selected Papers (Paperback, 2012... Quantum Interaction - 6th International Symposium, QI 2012, Paris, June 27-29, 2012, Revised Selected Papers (Paperback, 2012 ed.)
Jerome R. Busemeyer, Francois du Bois, Ariane Lambert-Mogiliansky, Massimo Melucci
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Symposium on Quantum Interaction, QI 2012, held in Paris in June 2012. The 21 revised full papers presented were carefully reviewed and selected from 32 submissions. The papers cover various topics on quantum interaction.

Soft Computing for Knowledge Discovery - Introducing Cartesian Granule Features (Paperback, Softcover reprint of the original... Soft Computing for Knowledge Discovery - Introducing Cartesian Granule Features (Paperback, Softcover reprint of the original 1st ed. 2000)
James G. Shanahan
R4,027 Discovery Miles 40 270 Ships in 18 - 22 working days

Knowledge discovery is an area of computer science that attempts to uncover interesting and useful patterns in data that permit a computer to perform a task autonomously or assist a human in performing a task more efficiently. Soft Computing for Knowledge Discovery provides a self-contained and systematic exposition of the key theory and algorithms that form the core of knowledge discovery from a soft computing perspective. It focuses on knowledge representation, machine learning, and the key methodologies that make up the fabric of soft computing - fuzzy set theory, fuzzy logic, evolutionary computing, and various theories of probability (e.g. naive Bayes and Bayesian networks, Dempster-Shafer theory, mass assignment theory, and others). In addition to describing many state-of-the-art soft computing approaches to knowledge discovery, the author introduces Cartesian granule features and their corresponding learning algorithms as an intuitive approach to knowledge discovery. This new approach embraces the synergistic spirit of soft computing and exploits uncertainty in order to achieve tractability, transparency and generalization. Parallels are drawn between this approach and other well known approaches (such as naive Bayes and decision trees) leading to equivalences under certain conditions. The approaches presented are further illustrated in a battery of both artificial and real-world problems. Knowledge discovery in real-world problems, such as object recognition in outdoor scenes, medical diagnosis and control, is described in detail. These case studies provide further examples of how to apply the presented concepts and algorithms to practical problems. The author provides web page access to an online bibliography, datasets, source codes for several algorithms described in the book, and other information. Soft Computing for Knowledge Discovery is for advanced undergraduates, professionals and researchers in computer science, engineering and business information systems who work or have an interest in the dynamic fields of knowledge discovery and soft computing.

Evolution and Challenges in System Development (Paperback, Softcover reprint of the original 1st ed. 1999): Joze Zupancic, W.... Evolution and Challenges in System Development (Paperback, Softcover reprint of the original 1st ed. 1999)
Joze Zupancic, W. Gregory Wojtkowski, Wita Wojtkowski, Stanislaw Wrycza
R5,318 Discovery Miles 53 180 Ships in 18 - 22 working days

This book is a result of the Seventh International Conference on Information Sys tems Development-Methods and Tools, Theory and Practice held in Bled, Slovenia, Sep tember 21-23, 1998. The purpose of the conference was to address issues facing academia and industry when specifying, developing, managing, and improving information comput erized systems. During the past few years, many new concepts and approaches emerged in the Information Systems Development (ISD) field. The various theories, methods, and tools available to system developers also bring problems such as choosing the most effec tive approach for a specific task. This conference provides a meeting place for IS re searchers and practitioners from Eastern and Western Europe as well as from other parts of the world. An objective of the conference is not only to share scientific knowledge and in terests but to establish strong professional ties among the participants. The Seventh International Conference on Information Systems Develop ment-ISD'98 continues the concepts of the first Polish-Scandinavian Seminar on Current Trends in Information Systems Development Methodologies held in Gdansk, Poland in 1988. Through the years, the Seminar developed into the International Conference on In formation Systems Development. ISD'99 will be held in Boise, Idaho. The selection of papers was carried out by the International Program Committee. All papers were reviewed in advance by three people. Papers were judged according to their originality, relevance, and presentation quality. All papers were judged only on their own merits, independent of other submissions.

Information Security Applications - 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised... Information Security Applications - 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers (Paperback, 2012 ed.)
Dong Hoon Lee, Moti Yung
R1,432 Discovery Miles 14 320 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012. The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security.

Multi-disciplinary Trends in Artificial Intelligence - 6th International Workshop, MIWAI 2012, Ho Chin Minh City, Vietnam,... Multi-disciplinary Trends in Artificial Intelligence - 6th International Workshop, MIWAI 2012, Ho Chin Minh City, Vietnam, December 26-28, 2012, Proceedings (Paperback, 2012 ed.)
Chattrakul Sombattheera, Kim Loi Nguyen, Rajeev Wankar, Tho Quan
R1,422 Discovery Miles 14 220 Ships in 18 - 22 working days

This volume constitutes the refereed proceedings of the 6th Multi-disciplinary International Workshop On Artificial Intelligence, MIWAI 2012, held in Ho Chi Minh City, Vietnam, in December 2012. The 29 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections in AI-GIS for climate change, computer vision, decision theory, e-commerce and AI, multiagent planning and learning, game theory, industrial applications of AI, multiagent systems and evolving intelligence, robotics and Web services.

Media Computing - Computational Media Aesthetics (Paperback, Softcover reprint of the original 1st ed. 2002): Chitra Dorai,... Media Computing - Computational Media Aesthetics (Paperback, Softcover reprint of the original 1st ed. 2002)
Chitra Dorai, Svetha Venkatesh
R2,635 Discovery Miles 26 350 Ships in 18 - 22 working days

Traditionally, scientific fields have defined boundaries, and scientists work on research problems within those boundaries. However, from time to time those boundaries get shifted or blurred to evolve new fields. For instance, the original goal of computer vision was to understand a single image of a scene, by identifying objects, their structure, and spatial arrangements. This has been referred to as image understanding. Recently, computer vision has gradually been making the transition away from understanding single images to analyz ing image sequences, or video understanding. Video understanding deals with understanding of video sequences, e. g. , recognition of gestures, activities, fa cial expressions, etc. The main shift in the classic paradigm has been from the recognition of static objects in the scene to motion-based recognition of actions and events. Video understanding has overlapping research problems with other fields, therefore blurring the fixed boundaries. Computer graphics, image processing, and video databases have obvious overlap with computer vision. The main goal of computer graphics is to gener ate and animate realistic looking images, and videos. Researchers in computer graphics are increasingly employing techniques from computer vision to gen erate the synthetic imagery. A good example of this is image-based rendering and modeling techniques, in which geometry, appearance, and lighting is de rived from real images using computer vision techniques. Here the shift is from synthesis to analysis followed by synthesis.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Social and Professional Applications of…
Arthur Tatnall Hardcover R4,442 Discovery Miles 44 420
Think in Systems - The Theory and…
Zoe McKey Hardcover R670 Discovery Miles 6 700
Analysis and Design of Hybrid Systems…
Christos Cassandras, Alessandro Giua, … Paperback R4,405 R4,097 Discovery Miles 40 970
The Theory of Chaotic Attractors
Brian R. Hunt, Judy A. Kennedy, … Hardcover R2,778 Discovery Miles 27 780
Tools of Systems Thinkers - Learn…
Albert Rutherford Hardcover R751 Discovery Miles 7 510
Automated Machine Learning
Joaquin Vanschoren, Lars Kotthoff, … Hardcover R1,353 Discovery Miles 13 530
Girl Decoded - My Quest to Make…
Rana El Kaliouby Hardcover  (1)
R688 Discovery Miles 6 880
Thinking in Systems - International…
Donella Meadows Paperback R432 R403 Discovery Miles 4 030
Photographic Memory - Advanced…
Logan G Davidson Hardcover R464 Discovery Miles 4 640
Ethical Hacking - The Ultimate Guide to…
Lester Evans Hardcover R664 R593 Discovery Miles 5 930

 

Partners