|
|
Showing 1 - 25 of
30 matches in All Departments
This unique compendium focuses on the acquisition and analysis of
social media data. The approaches concern both the data-intensive
characteristics and graphical structures of social media. The book
addresses the critical problems in social media analysis, which
representatively cover its lifecycle.The must-have volume is an
excellent reference text for professionals, researchers, academics
and graduate students in AI and databases.
*Systematically introducing major components of SPM process. *Novel
hybrid methods (228 hybrids plus numerous variants) of modern
statistical methods or machine learning methods with mathematical
and/or univariate geostatistical methods. *Novel predictive
accuracy-based variable selection techniques for spatial predictive
methods. *Predictive accuracy-based parameter/model optimization.
*Reproducible examples for SPM of various data types in R.
Plasmonics stems from the surface charge density oscillations at
metal–dielectric interface, leading to extremely strong
light–matter interactions. In the past few decades, plasmonics
has become one of the most favorite fields/techniques in realizing
high-performance photonic devices. For this purpose, different new
concepts, such as exploration of different radiation frequency
regions, two-dimensional materials/heterostructures, and different
types of substrates for the excitation of plasmons have been
investigated for plasmonics-based sensors and detectors. This book
focuses on the recent and advanced works on optical sensors and
detectors utilizing plasmonic techniques for opto-electronic
applications. The book is unique as it describes both sensors and
detectors based on plasmonics and their practical applications in a
single book, a feature not found in any book so far.
A mechanical oscillator coupled to the optical field in a cavity is
a typical cavity optomechanical system. In our textbook, we prepare
to introduce the quantum optical properties of optomechanical
system, i.e. linear and nonlinear effects. Some quantum optical
devices based on optomechanical system are also presented in the
monograph, such as the Kerr modulator, quantum optical transistor,
optomechanical mass sensor, and so on. But most importantly, we
extend the idea of typical optomechanical system to coupled
mechanical resonator system and demonstrate that the combined
two-level structure and resonator system can serve as a generalized
optomechanical system. The quantum optical properties, which exist
in typical system, are also presented in the combined two-level
structure and resonator system.
The rise of Asia in global affairs has forced western thinkers to
rethink their assumptions, theories, and conclusions about the
region. Eric Voegelin's Asian Political Thought brings together a
mixture of established and rising scholars from both Asia and the
West to reflect upon the political philosopher's thought about
China, Japan, Korea, Central Asia, and India. From Voegelin's
writings, readers will not only understand how Voegelin's approach
can illuminate the fundamental principles and issues about Asia but
also what are the challenges and possibilities that Asia offers in
the twentieth-first century. For those who want to move past the
superficial commentary and cliches about Asia, Eric Voegelin's
Asian Political Thought is the book for you.
|
Security and Privacy in New Computing Environments - Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13-14, 2019, Proceedings (Paperback, 1st ed. 2019)
Jin Li, Zheli Liu, Hao Peng
|
R1,533
Discovery Miles 15 330
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the 2nd EAI
International Conference on Security and Privacy in New Computing
Environments, SPNCE 2019, held in Tianjin, China, in April 2019.
The 62 full papers were selected from 112 submissions and are
grouped into topics on privacy and security analysis, Internet of
Things and cloud computing, system building, scheme, model and
application for data, mechanism and method in new computing.
|
Cloud Computing, Security, Privacy in New Computing Environments - 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25-26, and December 15-16, 2016, Proceedings (Paperback, 1st ed. 2018)
Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, …
|
R2,037
Discovery Miles 20 370
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the 7th
International Conference on Cloud Computing, Security, Privacy in
New Computing Environments, CloudComp 2016, and the First EAI
International Conference SPNCE 2016, both held in Guangzhou, China,
in November and December 2016.The proceedings contain 10 full
papers selected from 27 submissions and presented at CloudComp 2016
and 12 full papers selected from 69 submissions and presented at
SPNCE 2016. CloudComp 2016 presents recent advances and experiences
in clouds, cloud computing and related ecosystems and business
support. SPNCE 2016 focuses on security and privacy aspects of new
computing environments including mobile computing, big data, cloud
computing and other large-scale environments.
|
Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part III (Paperback, 1st ed. 2018)
Jaideep Vaidya, Jin Li
|
R1,516
Discovery Miles 15 160
|
Ships in 18 - 22 working days
|
The four-volume set LNCS 11334-11337 constitutes the proceedings of
the 18th International Conference on Algorithms and Architectures
for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in
November 2018. The 141 full and 50 short papers presented were
carefully reviewed and selected from numerous submissions. The
papers are organized in topical sections on Distributed and
Parallel Computing; High Performance Computing; Big Data and
Information Processing; Internet of Things and Cloud Computing; and
Security and Privacy in Computing.
This book provides a thorough overview of the evolution of
privacy-preserving machine learning schemes over the last ten
years, after discussing the importance of privacy-preserving
techniques. In response to the diversity of Internet services, data
services based on machine learning are now available for various
applications, including risk assessment and image recognition. In
light of open access to datasets and not fully trusted
environments, machine learning-based applications face enormous
security and privacy risks. In turn, it presents studies conducted
to address privacy issues and a series of proposed solutions for
ensuring privacy protection in machine learning tasks involving
multiple parties. In closing, the book reviews state-of-the-art
privacy-preserving techniques and examines the security threats
they face.
|
Computational Intelligence and Intelligent Systems - 7th International Symposium, ISICA 2015, Guangzhou, China, November 21-22, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Kangshun Li, Jin Li, Yong Liu, Aniello Castiglione
|
R1,532
Discovery Miles 15 320
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the 7th
International Symposium on Intelligence Computation and
Applications, ISICA 2015, held in Guangzhou, China, in November
2015. The 77 revised full papers presented were carefully reviewed
and selected from 189 submissions. The papers feature the most
up-to-date research in analysis and theory of evolutionary
computation, neural network architectures and learning;
neuro-dynamics and neuro-engineering; fuzzy logic and control;
collective intelligence and hybrid systems; deep learning;
knowledge discovery; learning and reasoning.
Western and East Asian people hold fundamentally different beliefs
about learning that influence how they approach child rearing and
education. Reviewing decades of research, Dr Jin Li presents an
important conceptual distinction between the Western mind model and
the East Asian virtue model of learning. The former aims to
cultivate the mind to understand the world, whereas the latter
prioritizes the self to be perfected morally and socially. Tracing
the cultural origins of the two large intellectual traditions, Li
details how each model manifests itself in the psychology of the
learning process, learning affect, regard of one's learning peers,
expression of what one knows and parents' guiding efforts. Despite
today's accelerated cultural exchange, these learning models do not
diminish but endure.
This unique compendium focuses on the acquisition and analysis of
social media data. The approaches concern both the data-intensive
characteristics and graphical structures of social media. The book
addresses the critical problems in social media analysis, which
representatively cover its lifecycle.The must-have volume is an
excellent reference text for professionals, researchers, academics
and graduate students in AI and databases.
|
Machine Learning for Cyber Security - 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li
|
R2,726
Discovery Miles 27 260
|
Ships in 18 - 22 working days
|
The three-volume proceedings set LNCS 13655,13656 and 13657
constitutes the refereedproceedings of the 4th International
Conference on Machine Learning for Cyber Security, ML4CS 2022,
which taking place during December 2-4, 2022, held in Guangzhou,
China. The 100 full papers and 46 short papers were included in
these proceedings were carefully reviewed and selected from 367
submissions.
|
Machine Learning for Cyber Security - 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part II (Paperback, 1st ed. 2022)
Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li
|
R2,720
Discovery Miles 27 200
|
Ships in 18 - 22 working days
|
The three-volume proceedings set LNCS 13655,13656 and 13657
constitutes the refereedproceedings of the 4th International
Conference on Machine Learning for Cyber Security, ML4CS 2022,
which taking place during December 2-4, 2022, held in Guangzhou,
China. The 100 full papers and 46 short papers were included in
these proceedings were carefully reviewed and selected from 367
submissions.
|
Machine Learning for Cyber Security - 4th International Conference, ML4CS 2022, Guangzhou, China, December 2-4, 2022, Proceedings, Part III (Paperback, 1st ed. 2022)
Yuan Xu, Hongyang Yan, Huang Teng, Jun Cai, Jin Li
|
R2,730
Discovery Miles 27 300
|
Ships in 18 - 22 working days
|
The three-volume proceedings set LNCS 13655,13656 and 13657
constitutes the refereedproceedings of the 4th International
Conference on Machine Learning for Cyber Security, ML4CS 2022,
which taking place during December 2-4, 2022, held in Guangzhou,
China. The 100 full papers and 46 short papers were included in
these proceedings were carefully reviewed and selected from 367
submissions.
|
Security and Privacy in Social Networks and Big Data - 6th International Symposium, SocialSec 2020, Tianjin, China, September 26-27, 2020, Proceedings (Paperback, 1st ed. 2020)
Yang Xiang, Zheli Liu, Jin Li
|
R1,452
Discovery Miles 14 520
|
Ships in 18 - 22 working days
|
This book constitutes revised and selected papers from the 6th
International Symposium on Security and Privacy in Social Networks
and Big Data, SocialSec 2020, held in Tianjin, China, in September
2020. The 38 full papers presented in this volume were carefully
reviewed and selected from a total of 111 submissions. The papers
are organized according to the topical sections on big data
security; social networks; privacy-preserving and security.
|
Cyberspace Safety and Security - 11th International Symposium, CSS 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part II (Paperback, 1st ed. 2019)
Jaideep Vaidya, Xiao Zhang, Jin Li
|
R1,496
Discovery Miles 14 960
|
Ships in 18 - 22 working days
|
The two volumes LNCS 11982 and 11983 constitute the proceedings of
the 11th International Symposium on Cyberspace Safety and Security,
CSS 2019, held in Guangzhou, China, in December 2019. The 61 full
papers and 40 short papers presented were carefully reviewed and
selected from 235 submissions. The papers cover a broad range of
topics in the field of cyberspace safety and security, such as
authentication, access control, availability, integrity, privacy,
confidentiality, dependability and sustainability issues of
cyberspace. They are organized in the following topical sections:
network security; system security; information security; privacy
preservation; machine learning and security; cyberspace safety; big
data and security; and cloud and security;
|
Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part II (Paperback, 1st ed. 2018)
Jaideep Vaidya, Jin Li
|
R1,508
Discovery Miles 15 080
|
Ships in 18 - 22 working days
|
The four-volume set LNCS 11334-11337 constitutes the proceedings of
the 18th International Conference on Algorithms and Architectures
for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in
November 2018. The 141 full and 50 short papers presented were
carefully reviewed and selected from numerous submissions. The
papers are organized in topical sections on Distributed and
Parallel Computing; High Performance Computing; Big Data and
Information Processing; Internet of Things and Cloud Computing; and
Security and Privacy in Computing.
|
Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part IV (Paperback, 1st ed. 2018)
Jaideep Vaidya, Jin Li
|
R1,511
Discovery Miles 15 110
|
Ships in 18 - 22 working days
|
The four-volume set LNCS 11334-11337 constitutes the proceedings of
the 18th International Conference on Algorithms and Architectures
for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in
November 2018. The 141 full and 50 short papers presented were
carefully reviewed and selected from numerous submissions. The
papers are organized in topical sections on Distributed and
Parallel Computing; High Performance Computing; Big Data and
Information Processing; Internet of Things and Cloud Computing; and
Security and Privacy in Computing.
|
Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings (Paperback, 1st ed. 2018)
Man-Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, …
|
R2,483
Discovery Miles 24 830
|
Ships in 18 - 22 working days
|
This book constitutes the proceedings of the 12th International
Conference on Network and System Security, NSS 2018, held in Hong
Kong, China, in August 2018. The 26 revised full papers and 9 short
papers presented in this book were carefully reviewed and selected
from 88 initial submissions. The papers cover a wide range of
topics in the field, including blockchain, mobile security, applied
cryptography, authentication, biometrics, IoT, privacy, and
education.
|
Algorithms and Architectures for Parallel Processing - 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Jaideep Vaidya, Jin Li
|
R1,510
Discovery Miles 15 100
|
Ships in 18 - 22 working days
|
The four-volume set LNCS 11334-11337 constitutes the proceedings of
the 18th International Conference on Algorithms and Architectures
for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in
November 2018. The 141 full and 50 short papers presented were
carefully reviewed and selected from numerous submissions. The
papers are organized in topical sections on Distributed and
Parallel Computing; High Performance Computing; Big Data and
Information Processing; Internet of Things and Cloud Computing; and
Security and Privacy in Computing.
|
You may like...
Monster Hunter
Milla Jovovich, Tony Jaa, …
DVD
R210
Discovery Miles 2 100
Hypnotic
Ben Affleck, Alice Braga, …
DVD
R227
Discovery Miles 2 270
|