Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 5 of 5 matches in All Departments
This book constitutes the refereed proceedings of the 6th IFIP TC 5 International Conference on Computational Intelligence and Its Applications, CIIA 2018, held in Oran, Algeria, in May 2018. The 56 full papers presented were carefully reviewed and selected from 202 submissions. They are organized in the following topical sections: data mining and information retrieval; evolutionary computation; machine learning; optimization; planning and scheduling; wireless communication and mobile computing; Internet of Things (IoT) and decision support systems; pattern recognition and image processing; and semantic web services.
This book constitutes the thoroughly refereed proceedings of the 31st International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2018, held in Montreal, QC, Canada, in June 2018. The 53 full papers and 33 short papers presented were carefully reviewed and selected from 146 submissions. They are organized in the following topical sections: constraint solving and optimization; data mining and knowledge discovery; evolutionary computation; expert systems and robotics; knowledge representation, machine learning; meta-heuristics; multi-agent systems; natural language processing; neural networks; planning, scheduling and spatial reasoning; rough sets, Internet of Things (IoT), ubiquitous computing and big data; data science, privacy, and security; inelligent systems approaches in information extraction; and artificial intelligence, law and justice.
This book constitutes the refereed proceedings of the 6th IFIP TC 5 International Conference on Computational Intelligence and Its Applications, CIIA 2018, held in Oran, Algeria, in May 2018. The 56 full papers presented were carefully reviewed and selected from 202 submissions. They are organized in the following topical sections: data mining and information retrieval; evolutionary computation; machine learning; optimization; planning and scheduling; wireless communication and mobile computing; Internet of Things (IoT) and decision support systems; pattern recognition and image processing; and semantic web services.
This volume constitutes the proceedings of the 21st International Conference on Theorem Proving in Higher Order Logics (TPHOLs 2008), which was held during August 18-21, 2008 in Montreal, Canada. TPHOLs covers all aspects of theorem proving in higher order logics as well as related topics in theorem proving and veri?cation. There were 40 papers submitted to TPHOLs 2008 in the full research c- egory, each of which was refereed by at least four reviewers selected by the ProgramCommittee. Of these submissions, 17 researchpapers and 1 proofpearl were accepted for presentation at the conference and publication in this v- ume. In keeping with longstanding tradition, TPHOLs 2008 also o?ered a venue for the presentation of emerging trends, where researchers invited discussion by means of a brief introductory talk and then discussed their work at a poster session. A supplementary proceedings volume was published as a 2008 technical report of Concordia University. The organizersaregratefulto MichaelGordonand StevenMiller for agreeing togiveinvitedtalksatTPHOLs2008.Aspartofthecelebrationofthe20yearsof TPHOLs, TPHOLs 2008 invited tool developers and expert users to give special tool presentations of the most representative theorem provers in higher order logics. The following speakers kindly accepted our invitation and we aregrateful tothem: YvesBertot(Coq), MattKaufmann(ACL2), SamOwre(PVS), Konrad Slind (HOL), and Makarius Wenzel (Isabel
Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.
|
You may like...
|