![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > Artificial intelligence > Knowledge-based systems / expert systems
This book constitutes the refereed proceedings of the 8th International Conference on Knowledge Science, Engineering and Management, KSEM 2015, held in Chongqing, China, in October 2015. The 57 revised full papers presented together with 22 short papers and 5 keynotes were carefully selected and reviewed from 247 submissions. The papers are organized in topical sections on formal reasoning and ontologies; knowledge management and concept analysis; knowledge discovery and recognition methods; text mining and analysis; recommendation algorithms and systems; machine learning algorithms; detection methods and analysis; classification and clustering; mobile data analytics and knowledge management; bioinformatics and computational biology; and evidence theory and its application.
This book constitutes the refereed proceedings of the 4th International Symposium on Integrated Uncertainty in Knowledge Modeling and Decision Making, IUKM 2015, held in Nha Trang, Vietnam, in October 2015. The 40 revised full papers were carefully reviewed and selected from 58 submissions and are presented together with three keynote and invited talks. The papers provide a wealth of new ideas and report both theoretical and applied research on integrated uncertainty modeling and management
The two-volume set LNICST 150 and 151 constitutes the thoroughly refereed post-conference proceedings of the First International Internet of Things Summit, IoT360 2014, held in Rome, Italy, in October 2014. This volume contains 30 revised full papers carefully reviewed and selected from 51 submissions at the following three conferences: the First International Conference on Mobility and Smart Cities, Mobility IoT 2014; the First International Conference on Software-Defined and Virtualized Future Wireless Networks, SDWN 2014; and the First International Conference on Safety and Security in Internet of Things, SaSeIot 2014. This volume also includes 13 special contributions from recognized experts. The papers in this volume are dedicated to infrastructure-based solutions that will support the deployment of IoT services and applications in the future. They cover the following topics: sustainable solutions to the mobility and smart cities agenda; software defined techniques for supporting more flexible use of wireless and wireless sensor networks; opportunities and risks related to the safety and security in the IoT domain.
This book constitutes the proceedings of the 12th International Conference on Latent Variable Analysis and Signal Separation, LVA/ICS 2015, held in Liberec, Czech Republic, in August 2015. The 61 revised full papers presented - 29 accepted as oral presentations and 32 accepted as poster presentations - were carefully reviewed and selected from numerous submissions. Five special topics are addressed: tensor-based methods for blind signal separation; deep neural networks for supervised speech separation/enhancement; joined analysis of multiple datasets, data fusion, and related topics; advances in nonlinear blind source separation; sparse and low rank modeling for acoustic signal processing.
This three volume set LNAI 9244, 9245, and 9246 constitutes the refereed proceedings of the 8th International Conference on Intelligent Robotics and Applications, ICIRA 2015, held in Portsmouth, UK, in August 2015. The 61 papers included in the second volume are organized in topical sections on man-machine interaction; robot design, development and control; navigation and planning; robot motion analysis and planning; medical robot; prototyping; and manufacturing.
This work presents modern implementations of relevant molecular dynamics algorithms using ls1 mardyn, a simulation program for engineering applications. The text focuses strictly on HPC-related aspects, covering implementation on HPC architectures, taking Intel Xeon and Intel Xeon Phi clusters as representatives of current platforms. The work describes distributed and shared-memory parallelization on these platforms, including load balancing, with a particular focus on the efficient implementation of the compute kernels. The text also discusses the software-architecture of the resulting code.
This book constitutes the refereed proceedings of the 20th Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2015, held in Madrid, Spain, in June 2015. The revised 12 full papers presented together with two keynotes were carefully reviewed and selected from 36 submissions. They are organized in topical sections on language technology, real-time applications, critical systems, and multicore and distributed systems.
This book constitutes the proceedings of the 20th International Workshop on Formal Methods for Industrial Critical Systems, FMICS 2015, Oslo, Norway, in June 2015. The 12 papers presented in this volume were carefully reviewed and selected from 20 submissions. They are organized in topical sections: applications; protocols; specification and analysis; verification.
This volume constitutes the refereed proceedings of the Second International Conference on Geo-Informatics in Resource Management and Sustainable Ecosystem, GRMSE 2014, held in Ypsilanti, MI, China, in December 2014. The 73 papers presented were carefully reviewed and selected from 296 submissions. The papers are divided into topical sections on smart city in resource management and sustainable ecosystem; spatial data acquisition through RS and GIS in resource management and sustainable ecosystem; ecological and environmental data processing and management; advanced geospatial model and analysis for understanding ecological and environmental process; applications of geo-informatics in resource management and sustainable ecosystem.
This book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISC 2014, held in Hong Kong, China, in October 2014. The 20 revised full papers presented together with 16 short papers and two invited papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on public-key encryption, authentication, symmetric key cryptography, zero-knowledge proofs and arguments, outsourced and multi-party computations, implementation, information leakage, firewall and forensics, Web security, and android security.
Design for large-scale, high-performance queries using Snowflake's query processing engine to empower data consumers with timely, comprehensive, and secure access to data. This book also helps you protect your most valuable data assets using built-in security features such as end-to-end encryption for data at rest and in transit. It demonstrates key features in Snowflake and shows how to exploit those features to deliver a personalized experience to your customers. It also shows how to ingest the high volumes of both structured and unstructured data that are needed for game-changing business intelligence analysis. Mastering Snowflake Solutions starts with a refresher on Snowflake's unique architecture before getting into the advanced concepts that make Snowflake the market-leading product it is today. Progressing through each chapter, you will learn how to leverage storage, query processing, cloning, data sharing, and continuous data protection features. This approach allows for greater operational agility in responding to the needs of modern enterprises, for example in supporting agile development techniques via database cloning. The practical examples and in-depth background on theory in this book help you unleash the power of Snowflake in building a high-performance system with little to no administrative overhead. Your result from reading will be a deep understanding of Snowflake that enables taking full advantage of Snowflake's architecture to deliver value analytics insight to your business. What You Will Learn Optimize performance and costs associated with your use of the Snowflake data platform Enable data security to help in complying with consumer privacy regulations such as CCPA and GDPR Share data securely both inside your organization and with external partners Gain visibility to each interaction with your customers using continuous data feeds from Snowpipe Break down data silos to gain complete visibility your business-critical processes Transform customer experience and product quality through real-time analytics Who This Book Is for Data engineers, scientists, and architects who have had some exposure to the Snowflake data platform or bring some experience from working with another relational database. This book is for those beginning to struggle with new challenges as their Snowflake environment begins to mature, becoming more complex with ever increasing amounts of data, users, and requirements. New problems require a new approach and this book aims to arm you with the practical knowledge required to take advantage of Snowflake's unique architecture to get the results you need.
The two-volume set LNCS 8618 and 8619 constitutes the refereed proceedings of the 9th International Conference EuroHaptics 2014, held in Versailles, France, in June 2014. The 118 papers (36 oral presentations and 82 poster presentations) presented were carefully reviewed and selected from 183 submissions. Furthermore, 27 demos were exhibited, each of them resulting in a short paper included in the volumes. These proceedings reflect the multidisciplinary nature of EuroHaptics and cover topics such as human-computer interaction, human-robot interactions, neuroscience, perception and psychophysics, biomechanics and motor control, modelling and simulation; and a broad range of applications in medicine, rehabilitation, art, and design.
This three volume set LNAI 9244, 9245, and 9246 constitutes the refereed proceedings of the 8th International Conference on Intelligent Robotics and Applications, ICIRA 2015, held in Portsmouth, UK, in August 2015. The 60 papers included in the first volume are organized in topical sections on analysis and control for complex systems; marine vehicles and oceanic engineering; drives and actuators' modeling; biomechatronics in bionic dexterous hand; robot actuators and sensors; intelligent visual systems; estimation and identification; and adaptive control system.
Paying with mobile devices such as mobile phones or smart phones will expand worldwide in the coming years. This development provides opportunities for various industries (banking, telecommunications, credit card business, manufacturers, suppliers, retail) and for consumers. The book comprehensively describes current status, trends and critical aspects of successful mobile payment. It combines theory and practice. Comprising essential aspects of a successful mobile payment as well as successful case studies and practical examples, this book is for all who are developing, offering and using mobile payment.
This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Aided Verification, CAV 2013 held in St. Petersburg, Russia in July 2013. The 54 regular and 16 tool papers presented were carefully selected from 209 submissions. The papers are organized in topical sections on biology, concurrency, hardware, hybrid systems, interpolation, loops and termination, new domains, probability and statistics, SAT and SMZ, security, shape analysis, synthesis, and time.
This book constitutes the joint refereed proceedings of the 5th International Workshop on Communication Technologies for Vehicles/Trains, Nets4Cars 2013 and Nets4Trains 2013, held in Vilnius, Lithuania, in May 2013. The 12 full papers of the road track and 5 full papers of the rail track presented together with 3 invited talks were carefully reviewed and selected from 24 submissions. They address topics such as intra-vehicle, inter-vehicle and vehicle to infrastructure communications (protocols and standards), mobility and traffic models (models, methodologies, and techniques), testing, and applications.
Learn how to build a data science technology stack and perform good data science with repeatable methods. You will learn how to turn data lakes into business assets. The data science technology stack demonstrated in Practical Data Science is built from components in general use in the industry. Data scientist Andreas Vermeulen demonstrates in detail how to build and provision a technology stack to yield repeatable results. He shows you how to apply practical methods to extract actionable business knowledge from data lakes consisting of data from a polyglot of data types and dimensions. What You'll Learn Become fluent in the essential concepts and terminology of data science and data engineering Build and use a technology stack that meets industry criteria Master the methods for retrieving actionable business knowledge Coordinate the handling of polyglot data types in a data lake for repeatable results Who This Book Is For Data scientists and data engineers who are required to convert data from a data lake into actionable knowledge for their business, and students who aspire to be data scientists and data engineers
This book constitutes the refereed proceedings of the 10th International Conference on Smart Homes and Health Telematics, ICOST 2012, held in Artiminio, Tuscany, Italy, June 12- 15, 2012. The 25 revised full papers presented together with 22 short papers were carefully reviewed and selected from 74 submissions. The papers are categorized into a number of sessions that include: User Engagement for Improved Adoption of Assistive Technologies, Self-Management and Tele-Rehabilitation, Advances in Remote Monitoring and Activity Recognition, Sensor Networks for Unobstrusive Monitoring Solutions, and Real World "Aware" Systems.
This book constitutes the refereed proceedings of the international competition aimed at the evaluation and assessment of Ambient Assisted Living, EvAAL 2013, which was organized in three major events: the International Competition on Indoor Localization and Tracking for Ambient Assisted Living, which took place in Madrid, Spain, in July 2013; the International Competition on Activity Recognition for Ambient Assisted Living, which took place in Valencia, Spain, in July 2013; and the Final Workshop, which was held in Norrkoping, Sweden, in September 2013. The papers included in this book describe the organization and technical aspects of the competitions and provide a complete technical description of the competing artefacts and report on the experience lessons learned by the teams during the competition."
In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors. This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications. What You'll Learn What the blockchain is Why it is needed and what problem it solves Why there is so much excitement about the blockchain and its potential Major components and their purpose How various components of the blockchain work and interact Limitations, why they exist, and what has been done to overcome them Major application scenarios Who This Book Is For Everyone who wants to get a general idea of what blockchain technology is, how it works, and how it will potentially change the financial system as we know it
Welcome to the proceedings of the 4th European Conference on Smart Se- ing and Context hosted by the Centre for Communication Systems Research, University of Surrey, in Guildford, UK. Smart sensing and context are the key enablers for e?ective autonomous systems, providing transparent technologies to realize the vision of ubiquitous computing, intelligent services and networking. (Wireless) Sensor and actuator networks,tightly integratedinto the structure of the Internet provide the und- lying manifestation of the physical world into the Internet of Things. Networked sensorscaninfercontextfromrawdataandcaptureuserandapplicationneedsto provide smart adaptive services. Higher-level context can be deducted locally or remotelybycombining andabstractinginformationfromsmartsensors. The 4th European Conference on Smart Sensing and Context explored new techniques, algorithmsandarchitectures onutilizing contextandcontext-awareservicesand their applications. The conference builds on the success of the past editions held in Zu ..rich, Switzerland in 2008, in Kendal, UK in 2007 and in Enschede, The Netherlands in 2006. EuroSSC is a forum to exchange ideas and to discuss the most recent developments in smart sensing and context ?eld. It explores the latest ?ndings and state-of-the-art developments in technology, covering human and user aspects. The main topics discussed this year focused on embedded - plications, context-aware platforms, context processing, semantic technologies, mobile platforms and real-worlddeployment and exploitation scenarios. The - velopment of integrating sensor and actuator networks and context-platforms in a wider scale setting has added a new dimension to global networks and has - abled users and applications to interact with the physical world more e?ciently.
This volume contains the papers presented at the 6th International Symposium on Automated Technology for Veri?cation and Analysis held during October 20-23 in Seoul, Korea. The primary objective of the ATVA conferences remains the same: to exchange and promote the latest advances of state-of-the-art - search on theoretical and practical aspects of automated analysis, veri?cation, and synthesis. Among 66 research papers and 16 tool papers submitted to ATVA 2008, the Program Committee accepted 21 as regular papers, 7 as tool papers, and 5 as short papers. In all, 33 experts from 27 countries worked hard to make sure that every submission received as rigorous and fair an evaluation as possible. In addition, the program also included three excellent tutorials and keynote talksby DavidDill (StanfordUniversity), SriramRajamani(MicrosoftResearch India), and Natarajan Shankar (SRI International). The conference organizers were truly excited to have such distinguished researchers as keynote speakers. Many worked hard and o?ered their valuable time so generously to make ATVA 2008 successful. First of all, the conference organizers thank all 218 - searchers who worked hard to complete and submit papers to the conference. ThePCmembers, reviewers, andSteeringCommitteemembersalsodeserves- cial recognition. Without them, a competitive and peer-reviewed international symposium simply cannot take place. Manyorganizationssponsoredthesymposium.Theyinclude: TheKorean- stituteofInformationScientistsandEngineers(SIGPLandSoftwareEngineering Society), KoreaUniversity, KoreaAdvanced Institute ofScience and Technology (KAIST), the Software Process Improvement Center and the Defense Software Research Center at KAIST. The conference organizers also thank the BK p- gramatKoreaUniversityandtheDepartmentofComputerScienceatKAISTfor ?nancialsupport. We sincerely hope that the readers ?nd the proceedings of ATVA 2008 informative and reward
This two-volume set LNCS 11581 and 11582 constitutes the thoroughly refereed proceedings of the 10th International Conference on Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management, DHM 2019, which was held as part of the 21st HCI International Conference, HCII 2019, in Orlando, FL, USA, in July 2019.The total of 1275 papers and 209 posters included in the 35 HCII 2019 proceedings volumes were carefully reviewed and selected from 5029 submissions. DHM 2019 includes a total of 77 papers; they were organized in topical sections named: Part I, Human Body and Motion: Anthropometry and computer aided ergonomics; motion prediction and motion capture; work modelling and industrial applications; risk assessment and safety. Part II, Healthcare Applications: Models in healthcare; quality of life technologies; health dialogues; health games and social communities.
Belief revision is a topic of much interest in theoretical computer science and logic, and it forms a central problem in research into artificial intelligence. In simple terms: how do you update a database of knowledge in the light of new information? What if the new information is in conflict with something that was previously held to be true? An intelligent system should be able to accommodate all such cases. This book contains a collection of research articles on belief revision that are completely up to date and an introductory chapter that presents a survey of current research in the area and the fundamentals of the theory. Thus this volume will be useful as a textbook on belief revision.
Computer Supported Argument Visualization is attracting attention across education, science, public policy and business. More than ever, we need sense-making tools to help negotiate understanding in the face of multi-stakeholder, ill-structured problems. In order to be effective, these tools must support human cognitive and discursive processes, and provide suitable representations, services and user interfaces. Visualizing Argumentation is written by practitioners and researchers for colleagues working in collaborative knowledge media, educational technology and organizational sense-making. It will also be of interest to theorists interested in software tools which embody different argumentation models. Particular emphasis is placed on the usability and effectiveness of tools in different contexts. Among the key features are: - Case studies covering educational, public policy, business and scientific argumentation- Expanded, regularly updated resources on the companion website:www.VisualizingArgumentation.info "The old leadership idea of "vision" has been transformed in the face of wicked problems in the new organizational landscape. In this excellent book we find a comprehensive yet practical guide for using visual methods to collaborate in the construction of shared knowledge. This book is essential for managers and leaders seeking new ways of navigating complexity and chaos in the workplace." (Charles J. Palus, Ph.D, Center for Creative Leadership, Greensboro, North Carolina, USA) |
![]() ![]() You may like...
Rough Computing - Theories, Technologies…
Aboul Ella Hassanien, Zbigniew Suraj, …
Hardcover
R4,951
Discovery Miles 49 510
|