Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 7 of 7 matches in All Departments
Many industrial applications built today are increasingly using emerging behavior engineering technologies: this book looks at various research and practical issues for researchers and students working in computer science and engineering, and for industry technology providers interested in behavior engineering and applications. Behavior Engineering and Applications encompasses intelligent and efficient computational solutions, including models, architectures, algorithms and specific applications, focused on processing, discovering, understanding and analyzing the behavior captured by the above data. Focusing on applying any engineering paradigm to systemically process, discover, understand and analyze these data, this book also addresses problems in a variety of areas and applications that related to behavior engineering. This book includes chapters derived from selected papers from The 2016 International Conference on Behavior Engineering (ICBE), as well as separate contributions the editors selected cutting-edge research related to behavior engineering.
Many industrial applications built today are increasingly using emerging behavior engineering technologies: this book looks at various research and practical issues for researchers and students working in computer science and engineering, and for industry technology providers interested in behavior engineering and applications. Behavior Engineering and Applications encompasses intelligent and efficient computational solutions, including models, architectures, algorithms and specific applications, focused on processing, discovering, understanding and analyzing the behavior captured by the above data. Focusing on applying any engineering paradigm to systemically process, discover, understand and analyze these data, this book also addresses problems in a variety of areas and applications that related to behavior engineering. This book includes chapters derived from selected papers from The 2016 International Conference on Behavior Engineering (ICBE), as well as separate contributions the editors selected cutting-edge research related to behavior engineering.
Welcome to ICSOC-ServiceWave 2009. This volume contains the research and demopapersselectedforpresentationattheSeventhInternationalConferenceon Service-Oriented Computing, which was held in Stockholm, Sweden, November 24-27, 2009. Continuing the tradition set in the previous six years, we are pleased to present a high-quality technical program.This year ICSOC ServiceWaveworked together to convey a world-leading and unique opportunity for academic - searchers and industry practitioners to report their state-of-the-art research ?ndings in service-orientedcomputing. The joint conference aims to foster cro- community scienti?c excellence by gathering experts from various disciplines such as distributed systems, software engineering, computer networks, business intelligence, service science, grid and cloud computing, and security. Consistent with the high quality of the conference, we received 228 paper submissions from a number of di?erent disciplines. Thirty-sevenpapers were - cepted as regular contributions, for a very competitive acceptance rate of 16%; eight further submissions were accepted as short papers. The programalso c- prisedninedemonstrationsofinnovativetoolsandprototypes.Alltheseelements contributed to a program that covered the many di? erent areas of the discipline and provided an up-to-date synthesis of the researchon service-orientedsystems and applications.
Welcome to the Advanced Workshop on Content Computing 2004. The focus of this workshop was "Content Computing." It emphasized research areas that facilitate e?cient, appropriate dissemination of content to users with the nec- saryaccessrights. Weusetheword"content"insteadof"information"or"data" because we want to cover not only raw data but also presentation quality. The fast growth of the Internet has already made it the key infrastructure for informationdissemination, education, business andentertainment. While the client-server model has been the most widely adopted paradigm for the WWW, thedesiretoprovidemorevalue-addedservicesinthedeliverylayerhasledtothe concept of an active network, where content-driven, intelligent computation will be performed to provide quality-of-service for content presentation and best-'t client demand. These value-added services typically aim to enhance information security, provide pervasive Internet access, and improve application robustness, system/networkperformance, knowledgeextraction, etc. Theyarerealizedby- corporatingsophisticatedmechanisms atthe deliverylayer, which is transparent to the content providers and Web surfers. Consequently, the notion of "Content Computing" has emerged. Content computing is a new paradigm for coordin- ing distributed systems and intelligent networks, based on a peer-to-peer model and with value-added processing of the application-speci?c contents at the - livery layer. This paradigm is especially useful to pervasive lightweight client devices such as mobile and portable end-user terminals with a wide variation of hardware/software con?gurations. This year, the workshop was held in Zhenjiang, Jiangsu, China. We received 194 high-quality papers from 11 regions, namely PR China, Korea, Singapore, Japan, United States, Canada, Australia, Germany, Taiwan, Italy, and Hong Kong. Totally, 62 papers were accepted and presented in the workshop.
Since the start of the International Workshop on Web Caching and Content Distribution (WCW) in 1996, it has served as the premiere meeting for researchers and practitioners to exchange results and visions on all aspects of content caching, distribution, and delivery. Building on the success of the previous WCW meetings, WCW 2004 extended its scope and covered interesting research and deployment areas relating to content services as they move through the Internet. This year, WCW was held in Beijing, China. Although it was the first time that WCW was held in Asia, we received more than 50 high quality papers from five continents. Fifteen papers were accepted as regular papers and 6 papers as synopses to appear in the proceedings. The topics covered included architectural issues, routing and placement, caching in both traditional content delivery networks as well as in peer-- peer systems, systems management and deployment, and performance evaluation. We would like to take this opportunity to thank all those who submitted papers to WCW 2004 for their valued contribution to the workshop. This event would not have been possible without the broad and personal support and the invaluable suggestions and contributions of the members of the program committee and the steering committee.
This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016. The 20 revised full papers and 16 short papers presented were carefully selected from 60 submissions. The papers cover topics such as IoT security; cloud security; applied cryptography; attack behaviour analytics; authentication and authorization; engineering issues of cryptographic and security systems; privacy protection; risk evaluation and security; key management and language-based security; and network security.
This book constitutes the refereed proceedings of the 4th International Conference on Soft Computing, Intelligent Systems, and Information Technology, ICSIIT 2015, held in Bali, Indonesia, in March 2015. The 34 revised full papers presented together with 19 short papers, one keynote and 2 invited talks were carefully reviewed and selected from 92 submissions. The papers cover a wide range of topics related to intelligence in the era of Big Data, such as fuzzy logic and control system; genetic algorithm and heuristic approaches; artificial intelligence and machine learning; similarity-based models; classification and clustering techniques; intelligent data processing; feature extraction; image recognition; visualization techniques; intelligent network; cloud and parallel computing; strategic planning; intelligent applications; and intelligent systems for enterprise, government and society.
|
You may like...
Twice The Glory - The Making Of The…
Lloyd Burnard, Khanyiso Tshwaku
Paperback
Hiking Beyond Cape Town - 40 Inspiring…
Nina du Plessis, Willie Olivier
Paperback
1 Recce: Volume 3 - Onsigbaarheid Is Ons…
Alexander Strachan
Paperback
|