![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Artificial intelligence > Knowledge-based systems / expert systems
This book constitutes the refereed proceedings of the 19th Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2014, held in Paris, France, in June 2014. The revised 12 full papers presented together with two keynotes were carefully reviewed and selected from 68 submissions. They are organized in topical sections on formal methods; uses of ada; real-time scheduling; applications.
This book constitutes the proceedings of the 6th International Workshop on Communication Technologies for Vehicles, Nets4Cars/Nets4Trains/Nets4Aircraft 2014, held in Offenburg, Germany in May 2014. The 10 papers presented in this volume were carefully reviewed and selected from 15 submissions. The book also contains 4 invited papers. The contributions are organized in topical sections named: automotive issues, car-to-car, aviation issues, in-car, and infrastructures.
This book constitutes the refereed proceedings of the 6th International Conference, ICISP 2014, held in June/July 2014 in Cherbourg, France. The 76 revised full papers were carefully reviewed and selected from 164 submissions. The contributions are organized in topical sections on multispectral colour science, color imaging and applications, digital cultural heritage, document image analysis, graph-based representations, image filtering and representation, computer vision and pattern recognition, computer graphics, biomedical, and signal processing.
Data Intensive Computing refers to capturing, managing, analyzing, and understanding data at volumes and rates that push the frontiers of current technologies. The challenge of data intensive computing is to provide the hardware architectures and related software systems and techniques which are capable of transforming ultra-large data into valuable knowledge. "Handbook of Data Intensive Computing" is written by leading international experts in the field. Experts from academia, research laboratories and private industry address both theory and application. Data intensive computing demands a fundamentally different set of principles than mainstream computing. Data-intensive applications typically are well suited for large-scale parallelism over the data and also require an extremely high degree of fault-tolerance, reliability, and availability. Real-world examples are provided throughout the book. "Handbook of Data Intensive Computing" is designed as a reference for practitioners and researchers, including programmers, computer and system infrastructure designers, and developers. This book can also be beneficial for business managers, entrepreneurs, and investors.
This book constitutes the refereed proceedings of the 11th
European Conference on Wireless Sensor Networks, EWSN 2014, held in
Oxford, UK, in February 2014.
This book constitutes the refereed proceedings of the 10th International Conference on Smart Homes and Health Telematics, ICOST 2012, held in Artiminio, Tuscany, Italy, June 12- 15, 2012. The 25 revised full papers presented together with 22 short papers were carefully reviewed and selected from 74 submissions. The papers are categorized into a number of sessions that include: User Engagement for Improved Adoption of Assistive Technologies, Self-Management and Tele-Rehabilitation, Advances in Remote Monitoring and Activity Recognition, Sensor Networks for Unobstrusive Monitoring Solutions, and Real World "Aware" Systems.
This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Aided Verification, CAV 2013 held in St. Petersburg, Russia in July 2013. The 54 regular and 16 tool papers presented were carefully selected from 209 submissions. The papers are organized in topical sections on biology, concurrency, hardware, hybrid systems, interpolation, loops and termination, new domains, probability and statistics, SAT and SMZ, security, shape analysis, synthesis, and time.
This book constitutes the thoroughly refereed conference proceedings of the 18th International Workshop on Formal Methods for Industrial Critical Systems, FMICS 2013, held in Madrid, Spain, in September 2013. The 13 papers presented were carefully selected from 25 submissions and cover topics such as design, specification, code generation and testing based on formal methods, methods, techniques and tools to support automated analysis, certification, debugging, learning, optimization and transformation of complex, distributed, dependable, real-time systems and embedded systems, verification and validation methods, tools for the development of formal design descriptions, case studies and experience reports on industrial applications of formal methods, impact of the adoption of formal methods on the development process and associated costs, application of formal methods in standardization and industrial forums.
This book constitutes the refereed proceedings of the 18th Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2013, was held in Berlin, Germany, in June 2013. The 11 full papers presented were carefully reviewed and selected from various submissions. They are organized in topical sections on multi-core and distributed systems; Ada and Spark; dependability; and real-time systems.
This book constitutes the joint refereed proceedings of the 5th International Workshop on Communication Technologies for Vehicles/Trains, Nets4Cars 2013 and Nets4Trains 2013, held in Vilnius, Lithuania, in May 2013. The 12 full papers of the road track and 5 full papers of the rail track presented together with 3 invited talks were carefully reviewed and selected from 24 submissions. They address topics such as intra-vehicle, inter-vehicle and vehicle to infrastructure communications (protocols and standards), mobility and traffic models (models, methodologies, and techniques), testing, and applications.
This book constitutes the refereed proceedings of the 11th International Conference on Smart Homes and Health Telematics, ICOST 2013, held in Singapore, in June 2013. The 22 revised full papers presented together with one invited paper and 19 short papers were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections on Supportive Technology for Ageing and People with Cognitive Impairment; Activity Recognition and Algorithmic Techniques; Trust, Security and Social Issues; Assistive Robotics and HCI Issues; Supporting Safety and Pervasive Healthcare; Home Energy Usage, Reasoning Framework, Services; Algorithms for Smart Homes; Eldercare - Activity Recognition and Fall Detection; Healthcare and Rehabilitation; Robotics and Assistive Living.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International Joint Conference on Knowledge Discovery, Knowledge Engineering, and Knowledge Management, IC3K 2011, held in Paris, France, in October 2011. This book includes revised and extended versions of a strict selection of the best papers presented at the conference; 39 revised full papers together with one invited lecture were carefully reviewed and selected from 429 submissions. According to the three covered conferences KDIR 2011, KEOD 2011, and KMIS 2011, the papers are organized in topical sections on knowledge discovery and information retrieval, knowledge engineering and ontology development, and on knowledge management and information sharing.
With the proliferation of GPS devices in daily life, trajectory data that records where and when people move is now readily available on a large scale. As one of the most typical representatives, it has now become widely recognized that taxi trajectory data provides rich opportunities to enable promising smart urban services. Yet, a considerable gap still exists between the raw data available, and the extraction of actionable intelligence. This gap poses fundamental challenges on how we can achieve such intelligence. These challenges include inaccuracy issues, large data volumes to process, and sparse GPS data, to name but a few. Moreover, the movements of taxis and the leaving trajectory data are the result of a complex interplay between several parties, including drivers, passengers, travellers, urban planners, etc. In this book, we present our latest findings on mining taxi GPS trajectory data to enable a number of smart urban services, and to bring us one step closer to the vision of smart mobility. Firstly, we focus on some fundamental issues in trajectory data mining and analytics, including data map-matching, data compression, and data protection. Secondly, driven by the real needs and the most common concerns of each party involved, we formulate each problem mathematically and propose novel data mining or machine learning methods to solve it. Extensive evaluations with real-world datasets are also provided, to demonstrate the effectiveness and efficiency of using trajectory data. Unlike other books, which deal with people and goods transportation separately, this book also extends smart urban services to goods transportation by introducing the idea of crowdshipping, i.e., recruiting taxis to make package deliveries on the basis of real-time information. Since people and goods are two essential components of smart cities, we feel this extension is bot logical and essential. Lastly, we discuss the most important scientific problems and open issues in mining GPS trajectory data.
This book constitutes the refereed proceedings of the international competition aimed at the evaluation and assessment of Ambient Assisted Living, EvAAL 2013, which was organized in three major events: the International Competition on Indoor Localization and Tracking for Ambient Assisted Living, which took place in Madrid, Spain, in July 2013; the International Competition on Activity Recognition for Ambient Assisted Living, which took place in Valencia, Spain, in July 2013; and the Final Workshop, which was held in Norrkoping, Sweden, in September 2013. The papers included in this book describe the organization and technical aspects of the competitions and provide a complete technical description of the competing artefacts and report on the experience lessons learned by the teams during the competition."
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Joint Conference on Knowledge Discovery, Knowledge Engineering, and Knowledge Management, IC3K 2010, held in Valencia, Spain, in October 2010. This book includes revised and extended versions of a strict selection of the best papers presented at the conference; 26 revised full papers together with 2 invited lectures were carefully reviewed and selected from 369 submissions. According to the three covered conferences KDIR 2010, KEOD 2010, and KMIS 2010, the papers are organized in topical sections on knowledge discovery and information retrieval, knowledge engineering and ontology development, and on knowledge management and information sharing.
This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles. To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling methods for the practical vehicle-to-roadside (V2R) Internet access procedure, and employ the interworking of V2R and vehicle-to-vehicle (V2V) to improve the network performance for a variety of automotive applications. In addition, the wireless link performance between a vehicle and an Internet access station is investigated, and a machine learning based algorithm is proposed to improve the link throughout by selecting an efficient modulation and coding scheme. This book also investigates the distributed machine learning algorithms over the Internet access of vehicles. A novel broadcasting scheme is designed to intelligently adjust the training users that are involved in the iteration rounds for an asynchronous federated learning scheme, which is shown to greatly improve the training efficiency. This book conducts the fully asynchronous machine learning evaluations among vehicle users that can utilize the opportunistic V2R communication to train machine learning models. Researchers and advanced-level students who focus on vehicular networks, industrial entities for internet of vehicles providers, government agencies target on transportation system and road management will find this book useful as reference. Network device manufacturers and network operators will also want to purchase this book.
Design for large-scale, high-performance queries using Snowflake's query processing engine to empower data consumers with timely, comprehensive, and secure access to data. This book also helps you protect your most valuable data assets using built-in security features such as end-to-end encryption for data at rest and in transit. It demonstrates key features in Snowflake and shows how to exploit those features to deliver a personalized experience to your customers. It also shows how to ingest the high volumes of both structured and unstructured data that are needed for game-changing business intelligence analysis. Mastering Snowflake Solutions starts with a refresher on Snowflake's unique architecture before getting into the advanced concepts that make Snowflake the market-leading product it is today. Progressing through each chapter, you will learn how to leverage storage, query processing, cloning, data sharing, and continuous data protection features. This approach allows for greater operational agility in responding to the needs of modern enterprises, for example in supporting agile development techniques via database cloning. The practical examples and in-depth background on theory in this book help you unleash the power of Snowflake in building a high-performance system with little to no administrative overhead. Your result from reading will be a deep understanding of Snowflake that enables taking full advantage of Snowflake's architecture to deliver value analytics insight to your business. What You Will Learn Optimize performance and costs associated with your use of the Snowflake data platform Enable data security to help in complying with consumer privacy regulations such as CCPA and GDPR Share data securely both inside your organization and with external partners Gain visibility to each interaction with your customers using continuous data feeds from Snowpipe Break down data silos to gain complete visibility your business-critical processes Transform customer experience and product quality through real-time analytics Who This Book Is for Data engineers, scientists, and architects who have had some exposure to the Snowflake data platform or bring some experience from working with another relational database. This book is for those beginning to struggle with new challenges as their Snowflake environment begins to mature, becoming more complex with ever increasing amounts of data, users, and requirements. New problems require a new approach and this book aims to arm you with the practical knowledge required to take advantage of Snowflake's unique architecture to get the results you need.
Without correct timing, there is no safe and reliable embedded software. This book shows how to consider timing early in the development process for embedded systems, how to solve acute timing problems, how to perform timing optimization, and how to address the aspect of timing verification.The book is organized in twelve chapters. The first three cover various basics of microprocessor technologies and the operating systems used therein. The next four chapters cover timing problems both in theory and practice, covering also various timing analysis techniques as well as special issues like multi- and many-core timing. Chapter 8 deals with aspects of timing optimization, followed by chapter 9 that highlights various methodological issues of the actual development process. Chapter 10 presents timing analysis in AUTOSAR in detail, while chapter 11 focuses on safety aspects and timing verification. Finally, chapter 12 provides an outlook on upcoming and future developments in software timing. The number of embedded systems that we encounter in everyday life is growing steadily. At the same time, the complexity of the software is constantly increasing. This book is mainly written for software developers and project leaders in industry. It is enriched by many practical examples mostly from the automotive domain, yet the vast majority of the book is relevant for any embedded software project. This way it is also well-suited as a textbook for academic courses with a strong practical emphasis, e.g. at applied sciences universities. Features and Benefits * Shows how to consider timing in the development process for embedded systems, how to solve timing problems, and how to address timing verification * Enriched by many practical examples mostly from the automotive domain * Mainly written for software developers and project leaders in industry
Focus on issues and principles in context awareness, sensor processing and software design (rather than sensor networks or HCI or particular commercial systems). Designed as a textbook, with readings and lab problems in most chapters. Focus on concepts, algorithms and ideas rather than particular technologies.
Many of the modern applications of microelectronics require hugeamounts of computations. Despite all recent improvements in fabrication technologies, some of these computations have to be performed in hardware in order to meet deadlines. However, controlling computations by software is frequently pre ferred due to the larger flexibility. Hence, in general, modern applications re quire a mix of software-based and hardware-based computations. Applications using this mix can be designed with the help of hardware/software co-design systems. Many such co-design systems have been described so far (references can be found in this book), but many of these are based on heuristics. In this book, Niemann describes a co-design system which is based on sound modeling techniques. This system has the following salient features: * Precise cost and performance figures Design decisions for implementing a certain function in hardware or software are based on 'cost and performance figures for the different design alterna tives. Hence, good designs can only be expected if these figures are accurate. In order to achieve excellent accuracy, Niemann takes a new approach: the cost of software implementations is derived from the data available about the target processors and from knowledge about the code size. the performance of software implement at ions is computed by compiling the given function and then using static analysis for computing worst case execution times. the cost of hardware implementation is estimated by running higher-Ievel synthesis tools. the performance of hardware implementations is again computed by us ing static analysis.
The 2008 TUB-SJTU joint workshop on Autonomous Systems Self-Organization, Management, and Control was held on October 6, 2008 at Shanghai Jiao Tong University, Shanghai, China. The workshop, sponsored by Shanghai Jiao Tong University and Technical University of Berlin brought together scientists and researchers from both universities to present and discuss the latest progress on autonomous systems and its applications in diverse areas. Autonomous systems are designed to integrate machines, computing, sensing, and software to create intelligent systems capable of interacting with the complexities of the real world. Autonomous systems represent the physical embodiment of machine intelligence. Topics of interest include, but are not limited to theory and modeling for autonomous systems; organization of autonomous systems; learning and perception; complex systems; multi-agent systems; robotics and control; applications of autonomous systems.
Welcome to the proceedings of the 4th European Conference on Smart Se- ing and Context hosted by the Centre for Communication Systems Research, University of Surrey, in Guildford, UK. Smart sensing and context are the key enablers for e?ective autonomous systems, providing transparent technologies to realize the vision of ubiquitous computing, intelligent services and networking. (Wireless) Sensor and actuator networks,tightly integratedinto the structure of the Internet provide the und- lying manifestation of the physical world into the Internet of Things. Networked sensorscaninfercontextfromrawdataandcaptureuserandapplicationneedsto provide smart adaptive services. Higher-level context can be deducted locally or remotelybycombining andabstractinginformationfromsmartsensors. The 4th European Conference on Smart Sensing and Context explored new techniques, algorithmsandarchitectures onutilizing contextandcontext-awareservicesand their applications. The conference builds on the success of the past editions held in Zu ..rich, Switzerland in 2008, in Kendal, UK in 2007 and in Enschede, The Netherlands in 2006. EuroSSC is a forum to exchange ideas and to discuss the most recent developments in smart sensing and context ?eld. It explores the latest ?ndings and state-of-the-art developments in technology, covering human and user aspects. The main topics discussed this year focused on embedded - plications, context-aware platforms, context processing, semantic technologies, mobile platforms and real-worlddeployment and exploitation scenarios. The - velopment of integrating sensor and actuator networks and context-platforms in a wider scale setting has added a new dimension to global networks and has - abled users and applications to interact with the physical world more e?ciently.
Sharing knowledge in policing remains a significant challenge for police forces around the world. The Bichard Inquiry examined the effectiveness of police forces' information sharing and found it to be severely lacking. This unique book sets out the conceptual framework for knowledge management and explains how a greater understanding of the subject can help policing at an operational level. The book is split into a clear and logical three part structure: Part I covers the foundations of knowledge management and the key security issues in relation to a 'globalised' world of crime and terrorism, Part II looks at the building of structures and the use of applications and Part III integrates the first two parts by providing illustrative examples of working applications of police-specific knowledge management systems. Drawing on examples from around the world, the book takes the reader through the range of different systems and approaches and shows how they can be implemented in practice using illustrative case studies and practical diagrams. This is an ideal purchase for all police professionals and policing academics with an interest in, or role in knowledge management systems.
Dieses Lehrbuch bietet eine umfassende EinfA1/4hrung in Grundlagen und Methoden der Computerlinguistik und stellt die wichtigsten Anwendungsgebiete in der Sprachtechnologie vor. Es richtet sich gleichermaAen an Studierende der Computerlinguistik und verwandter FAcher mit Bezug zur Verarbeitung natA1/4rlicher Sprache wie an Entwickler sprachverarbeitender Systeme. FA1/4r die dritte Auflage wurden sAmtliche Kapitel A1/4berarbeitet und aktualisiert sowie zum Teil zu eigenstAndigen, neuen Kapiteln zusammengefA1/4hrt. Insbesondere trAgt die dritte Auflage der rasanten Entwicklung in der Computerlinguistik und Sprachtechnologie durch eine stArkere Fokussierung auf statistische Grundlagen und Methoden Rechnung.
Here are the proceedings of the Third International Joint Conference on Automated Reasoning, IJCAR 2006, held in Seattle, Washington, USA, August 2006. The book presents 41 revised full research papers and 8 revised system descriptions, with 3 invited papers and a summary of a systems competition. The papers are organized in topical sections on proofs, search, higher-order logic, proof theory, proof checking, combination, decision procedures, CASC-J3, rewriting, and description logic. |
You may like...
A Handbook of Artificial Intelligence in…
Anil K. Philip, Aliasgar Shahiwala, …
Paperback
R2,963
Discovery Miles 29 630
Blockchain Technology for Emerging…
S. K. Hafizul Islam, Arup Kumar Pal, …
Paperback
R2,941
Discovery Miles 29 410
Artificial Intelligence and Data Science…
Mohsen Asadnia, Amir Razmjou, …
Paperback
R2,578
Discovery Miles 25 780
Machine Learning, Big Data, and IoT for…
Pardeep Kumar, Yugal Kumar, …
Paperback
R2,657
Discovery Miles 26 570
5G IoT and Edge Computing for Smart…
Akash Kumar Bhoi, Victor Hugo Costa de Albuquerque, …
Paperback
R2,588
Discovery Miles 25 880
|