![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Artificial intelligence > Knowledge-based systems / expert systems
This three volume set LNAI 9244, 9245, and 9246 constitutes the refereed proceedings of the 8th International Conference on Intelligent Robotics and Applications, ICIRA 2015, held in Portsmouth, UK, in August 2015. The 60 papers included in the first volume are organized in topical sections on analysis and control for complex systems; marine vehicles and oceanic engineering; drives and actuators' modeling; biomechatronics in bionic dexterous hand; robot actuators and sensors; intelligent visual systems; estimation and identification; and adaptive control system.
This work presents modern implementations of relevant molecular dynamics algorithms using ls1 mardyn, a simulation program for engineering applications. The text focuses strictly on HPC-related aspects, covering implementation on HPC architectures, taking Intel Xeon and Intel Xeon Phi clusters as representatives of current platforms. The work describes distributed and shared-memory parallelization on these platforms, including load balancing, with a particular focus on the efficient implementation of the compute kernels. The text also discusses the software-architecture of the resulting code.
This book constitutes the refereed proceedings of the 20th Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2015, held in Madrid, Spain, in June 2015. The revised 12 full papers presented together with two keynotes were carefully reviewed and selected from 36 submissions. They are organized in topical sections on language technology, real-time applications, critical systems, and multicore and distributed systems.
This book constitutes the proceedings of the 20th International Workshop on Formal Methods for Industrial Critical Systems, FMICS 2015, Oslo, Norway, in June 2015. The 12 papers presented in this volume were carefully reviewed and selected from 20 submissions. They are organized in topical sections: applications; protocols; specification and analysis; verification.
This volume constitutes the refereed proceedings of the Second International Conference on Geo-Informatics in Resource Management and Sustainable Ecosystem, GRMSE 2014, held in Ypsilanti, MI, China, in December 2014. The 73 papers presented were carefully reviewed and selected from 296 submissions. The papers are divided into topical sections on smart city in resource management and sustainable ecosystem; spatial data acquisition through RS and GIS in resource management and sustainable ecosystem; ecological and environmental data processing and management; advanced geospatial model and analysis for understanding ecological and environmental process; applications of geo-informatics in resource management and sustainable ecosystem.
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.
Design for large-scale, high-performance queries using Snowflake's query processing engine to empower data consumers with timely, comprehensive, and secure access to data. This book also helps you protect your most valuable data assets using built-in security features such as end-to-end encryption for data at rest and in transit. It demonstrates key features in Snowflake and shows how to exploit those features to deliver a personalized experience to your customers. It also shows how to ingest the high volumes of both structured and unstructured data that are needed for game-changing business intelligence analysis. Mastering Snowflake Solutions starts with a refresher on Snowflake's unique architecture before getting into the advanced concepts that make Snowflake the market-leading product it is today. Progressing through each chapter, you will learn how to leverage storage, query processing, cloning, data sharing, and continuous data protection features. This approach allows for greater operational agility in responding to the needs of modern enterprises, for example in supporting agile development techniques via database cloning. The practical examples and in-depth background on theory in this book help you unleash the power of Snowflake in building a high-performance system with little to no administrative overhead. Your result from reading will be a deep understanding of Snowflake that enables taking full advantage of Snowflake's architecture to deliver value analytics insight to your business. What You Will Learn Optimize performance and costs associated with your use of the Snowflake data platform Enable data security to help in complying with consumer privacy regulations such as CCPA and GDPR Share data securely both inside your organization and with external partners Gain visibility to each interaction with your customers using continuous data feeds from Snowpipe Break down data silos to gain complete visibility your business-critical processes Transform customer experience and product quality through real-time analytics Who This Book Is for Data engineers, scientists, and architects who have had some exposure to the Snowflake data platform or bring some experience from working with another relational database. This book is for those beginning to struggle with new challenges as their Snowflake environment begins to mature, becoming more complex with ever increasing amounts of data, users, and requirements. New problems require a new approach and this book aims to arm you with the practical knowledge required to take advantage of Snowflake's unique architecture to get the results you need.
The two-volume set LNCS 8618 and 8619 constitutes the refereed proceedings of the 9th International Conference EuroHaptics 2014, held in Versailles, France, in June 2014. The 118 papers (36 oral presentations and 82 poster presentations) presented were carefully reviewed and selected from 183 submissions. Furthermore, 27 demos were exhibited, each of them resulting in a short paper included in the volumes. These proceedings reflect the multidisciplinary nature of EuroHaptics and cover topics such as human-computer interaction, human-robot interactions, neuroscience, perception and psychophysics, biomechanics and motor control, modelling and simulation; and a broad range of applications in medicine, rehabilitation, art, and design.
Paying with mobile devices such as mobile phones or smart phones will expand worldwide in the coming years. This development provides opportunities for various industries (banking, telecommunications, credit card business, manufacturers, suppliers, retail) and for consumers. The book comprehensively describes current status, trends and critical aspects of successful mobile payment. It combines theory and practice. Comprising essential aspects of a successful mobile payment as well as successful case studies and practical examples, this book is for all who are developing, offering and using mobile payment.
This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Aided Verification, CAV 2013 held in St. Petersburg, Russia in July 2013. The 54 regular and 16 tool papers presented were carefully selected from 209 submissions. The papers are organized in topical sections on biology, concurrency, hardware, hybrid systems, interpolation, loops and termination, new domains, probability and statistics, SAT and SMZ, security, shape analysis, synthesis, and time.
This book constitutes the joint refereed proceedings of the 5th International Workshop on Communication Technologies for Vehicles/Trains, Nets4Cars 2013 and Nets4Trains 2013, held in Vilnius, Lithuania, in May 2013. The 12 full papers of the road track and 5 full papers of the rail track presented together with 3 invited talks were carefully reviewed and selected from 24 submissions. They address topics such as intra-vehicle, inter-vehicle and vehicle to infrastructure communications (protocols and standards), mobility and traffic models (models, methodologies, and techniques), testing, and applications.
This book constitutes the refereed proceedings of the 10th International Conference on Smart Homes and Health Telematics, ICOST 2012, held in Artiminio, Tuscany, Italy, June 12- 15, 2012. The 25 revised full papers presented together with 22 short papers were carefully reviewed and selected from 74 submissions. The papers are categorized into a number of sessions that include: User Engagement for Improved Adoption of Assistive Technologies, Self-Management and Tele-Rehabilitation, Advances in Remote Monitoring and Activity Recognition, Sensor Networks for Unobstrusive Monitoring Solutions, and Real World "Aware" Systems.
This book constitutes the refereed proceedings of the international competition aimed at the evaluation and assessment of Ambient Assisted Living, EvAAL 2013, which was organized in three major events: the International Competition on Indoor Localization and Tracking for Ambient Assisted Living, which took place in Madrid, Spain, in July 2013; the International Competition on Activity Recognition for Ambient Assisted Living, which took place in Valencia, Spain, in July 2013; and the Final Workshop, which was held in Norrkoping, Sweden, in September 2013. The papers included in this book describe the organization and technical aspects of the competitions and provide a complete technical description of the competing artefacts and report on the experience lessons learned by the teams during the competition."
Recommended by Bill Gates A thought-provoking and wide-ranging exploration of machine learning and the race to build computer intelligences as flexible as our own In the world's top research labs and universities, the race is on to invent the ultimate learning algorithm: one capable of discovering any knowledge from data, and doing anything we want, before we even ask. In The Master Algorithm, Pedro Domingos lifts the veil to give us a peek inside the learning machines that power Google, Amazon, and your smartphone. He assembles a blueprint for the future universal learner--the Master Algorithm--and discusses what it will mean for business, science, and society. If data-ism is today's philosophy, this book is its bible.
Welcome to the proceedings of the 4th European Conference on Smart Se- ing and Context hosted by the Centre for Communication Systems Research, University of Surrey, in Guildford, UK. Smart sensing and context are the key enablers for e?ective autonomous systems, providing transparent technologies to realize the vision of ubiquitous computing, intelligent services and networking. (Wireless) Sensor and actuator networks,tightly integratedinto the structure of the Internet provide the und- lying manifestation of the physical world into the Internet of Things. Networked sensorscaninfercontextfromrawdataandcaptureuserandapplicationneedsto provide smart adaptive services. Higher-level context can be deducted locally or remotelybycombining andabstractinginformationfromsmartsensors. The 4th European Conference on Smart Sensing and Context explored new techniques, algorithmsandarchitectures onutilizing contextandcontext-awareservicesand their applications. The conference builds on the success of the past editions held in Zu ..rich, Switzerland in 2008, in Kendal, UK in 2007 and in Enschede, The Netherlands in 2006. EuroSSC is a forum to exchange ideas and to discuss the most recent developments in smart sensing and context ?eld. It explores the latest ?ndings and state-of-the-art developments in technology, covering human and user aspects. The main topics discussed this year focused on embedded - plications, context-aware platforms, context processing, semantic technologies, mobile platforms and real-worlddeployment and exploitation scenarios. The - velopment of integrating sensor and actuator networks and context-platforms in a wider scale setting has added a new dimension to global networks and has - abled users and applications to interact with the physical world more e?ciently.
Explainable Deep Learning AI: Methods and Challenges presents the latest works of leading researchers in the XAI area, offering an overview of the XAI area, along with several novel technical methods and applications that address explainability challenges for deep learning AI systems. The book overviews XAI and then covers a number of specific technical works and approaches for deep learning, ranging from general XAI methods to specific XAI applications, and finally, with user-oriented evaluation approaches. It also explores the main categories of explainable AI - deep learning, which become the necessary condition in various applications of artificial intelligence. The groups of methods such as back-propagation and perturbation-based methods are explained, and the application to various kinds of data classification are presented.
Expert systems represent intelligent systems based on knowledge modeling, symbolic representation and its storage which allows for an unconventional method approach of complex applied analysis, sorting planning, design and diagnosis of problems in different areas of activity where an algorithmic description cannot be fully accomplished. Presently, the most intelligent systems from organizations are expert systems developed in accordance with fast prototyping methodology. Expert systems are used in a variety of areas, including, technical, banking, industrial and other professional areas. This book includes recent advances in expert systems research.
This volume contains the papers presented at the 6th International Symposium on Automated Technology for Veri?cation and Analysis held during October 20-23 in Seoul, Korea. The primary objective of the ATVA conferences remains the same: to exchange and promote the latest advances of state-of-the-art - search on theoretical and practical aspects of automated analysis, veri?cation, and synthesis. Among 66 research papers and 16 tool papers submitted to ATVA 2008, the Program Committee accepted 21 as regular papers, 7 as tool papers, and 5 as short papers. In all, 33 experts from 27 countries worked hard to make sure that every submission received as rigorous and fair an evaluation as possible. In addition, the program also included three excellent tutorials and keynote talksby DavidDill (StanfordUniversity), SriramRajamani(MicrosoftResearch India), and Natarajan Shankar (SRI International). The conference organizers were truly excited to have such distinguished researchers as keynote speakers. Many worked hard and o?ered their valuable time so generously to make ATVA 2008 successful. First of all, the conference organizers thank all 218 - searchers who worked hard to complete and submit papers to the conference. ThePCmembers, reviewers, andSteeringCommitteemembersalsodeserves- cial recognition. Without them, a competitive and peer-reviewed international symposium simply cannot take place. Manyorganizationssponsoredthesymposium.Theyinclude: TheKorean- stituteofInformationScientistsandEngineers(SIGPLandSoftwareEngineering Society), KoreaUniversity, KoreaAdvanced Institute ofScience and Technology (KAIST), the Software Process Improvement Center and the Defense Software Research Center at KAIST. The conference organizers also thank the BK p- gramatKoreaUniversityandtheDepartmentofComputerScienceatKAISTfor ?nancialsupport. We sincerely hope that the readers ?nd the proceedings of ATVA 2008 informative and reward
This two-volume set LNCS 11581 and 11582 constitutes the thoroughly refereed proceedings of the 10th International Conference on Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management, DHM 2019, which was held as part of the 21st HCI International Conference, HCII 2019, in Orlando, FL, USA, in July 2019.The total of 1275 papers and 209 posters included in the 35 HCII 2019 proceedings volumes were carefully reviewed and selected from 5029 submissions. DHM 2019 includes a total of 77 papers; they were organized in topical sections named: Part I, Human Body and Motion: Anthropometry and computer aided ergonomics; motion prediction and motion capture; work modelling and industrial applications; risk assessment and safety. Part II, Healthcare Applications: Models in healthcare; quality of life technologies; health dialogues; health games and social communities.
Belief revision is a topic of much interest in theoretical computer science and logic, and it forms a central problem in research into artificial intelligence. In simple terms: how do you update a database of knowledge in the light of new information? What if the new information is in conflict with something that was previously held to be true? An intelligent system should be able to accommodate all such cases. This book contains a collection of research articles on belief revision that are completely up to date and an introductory chapter that presents a survey of current research in the area and the fundamentals of the theory. Thus this volume will be useful as a textbook on belief revision.
While the dependability requirements of distributed real-time systems are expanding, there is currently no framework for defining and mapping these requirements into the system design and operation. A method of controlling and achieving the dependability level is real-time monitoring, which measures the degree of requirements fulfilment, relates it to the pre-defined, measurable system-level expectations and dynamically adapts the system, based on quality metrics, risk analysis, cost evaluation, control theory, neural networks, data acquisition and system knowledge management. The book deduces a framework to reveal, define, quantify, measure, analyse, design, implement, test, monitor and enhance dependability (functional and non-functional) requirements of a distributed system with real-time constraints. It is presented how the framework can be applied throughout all life-cycle stages, under varying constraints and with maximised cost effectiveness. An overview of the tools and methodologies applicable has been given and an integrated and generalised architecture for ensuring continuous fulfilment of system requirements, proposed. The framework provides a multilevel specification mechanism to establish the preservation of system requirements. This ensures the correct functioning of system through adaptations at run time. Among the benefits are controlled access and coordinated resource sharing in accordance with service-level agreement policies, multi-stakeholder interest preservation, transparency with respect to location, naming, performance etc., achievement of quality of service on demand, decentralisation, seamless integration of resources and applications, as well as increased predictability. READERSHIP: The intended audience is broad: real time and distributed systems scientists and developers, software engineers, students, quality assurance managers, contractors, users, service providers and all those searching for an alternative approach to handling and ensuring automated control of fulfilment of system requirements. Moreover, those needing a handbook on contract negotiations and a method of tracing operational results back into system requirements of long lived projects with high dependability and integrity demands.
Computer Supported Argument Visualization is attracting attention across education, science, public policy and business. More than ever, we need sense-making tools to help negotiate understanding in the face of multi-stakeholder, ill-structured problems. In order to be effective, these tools must support human cognitive and discursive processes, and provide suitable representations, services and user interfaces. Visualizing Argumentation is written by practitioners and researchers for colleagues working in collaborative knowledge media, educational technology and organizational sense-making. It will also be of interest to theorists interested in software tools which embody different argumentation models. Particular emphasis is placed on the usability and effectiveness of tools in different contexts. Among the key features are: - Case studies covering educational, public policy, business and scientific argumentation- Expanded, regularly updated resources on the companion website:www.VisualizingArgumentation.info "The old leadership idea of "vision" has been transformed in the face of wicked problems in the new organizational landscape. In this excellent book we find a comprehensive yet practical guide for using visual methods to collaborate in the construction of shared knowledge. This book is essential for managers and leaders seeking new ways of navigating complexity and chaos in the workplace." (Charles J. Palus, Ph.D, Center for Creative Leadership, Greensboro, North Carolina, USA)
This book de-emphasizes the formal mathematical description of spacecraft on-board attitude and orbit applications in favor of a more qualitative, concept-oriented presentation of these topics. The information presented in this book was originally given as a set of lectures in 1999 and 2000 instigated by a NASA Flight Software Branch Chief at Goddard Space Flight Center. The Branch Chief later suggested this book. It provides an approachable insight into the area and is not intended as an essential reference work. ACS Without an Attitude is intended for programmers and testers new to the field who are seeking a commonsense understanding of the subject matter they are coding and testing in the hope that they will reduce their risk of introducing or missing the key software bug that causes an abrupt termination in their spacecraft's mission. In addition, the book will provide managers and others working with spacecraft with a basic understanding of this subject.
In recent years, numerous research papers have considered the problem of privacy protection in biometric authentication systems. When someone wants to authenticate himself, the fresh biometric data he presents has to match with the reference related to the one he claims to be. Many proposals have been made to ensure the confidentiality of the biometric data involved during this verification. Also discussed in this compilation, is the problem of finding a face recognition system that works well both under variable illumination conditions and under strictly controlled acquisition conditions. Information fusion techniques are also explored and have been widely developed in the community of voice biometrics along with several uni-modal speaker recognition algorithms. |
![]() ![]() You may like...
War And Peace In The 20th Century And…
Geir Lundestad, Olav Njolstad
Paperback
R800
Discovery Miles 8 000
Multilateral Development Cooperation in…
H. Besada, S. Kindornay
Hardcover
R2,037
Discovery Miles 20 370
|