You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book gathers outstanding research papers presented in the International Conference on Computational Intelligence and Emerging Power System (ICCIPS 2021), held on March 9-10, 2021, at Engineering College Ajmer. ICCIPS 2021 is jointly organized by the Department of CSE and Department of EE, Engineering College Ajmer, Rajasthan, India. The topics covered in the book are collective intelligence, soft computing, optimization, cloud computing, machine learning, intelligent software, robotics, data science, data security, big data analytics, natural language processing, renewable energy, signal processing, optimization methods for power system, smart grid, micro-grid, energy management, power system, monitoring system, load management, and distributed generation.
This book provides the reader with the fundamental knowledge in the area of deep learning with application to visual content mining. The authors give a fresh view on Deep learning approaches both from the point of view of image understanding and supervised machine learning. It contains chapters which introduce theoretical and mathematical foundations of neural networks and related optimization methods. Then it discusses some particular very popular architectures used in the domain: convolutional neural networks and recurrent neural networks. Deep Learning is currently at the heart of most cutting edge technologies. It is in the core of the recent advances in Artificial Intelligence. Visual i...
This book constitutes the revised selected papers from the 13th International Conference on Risks and Security of Internet and Systems, CRiSIS 2018, held in Arcachon, France, in October 2018. The 12 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 34 submissions. They cover diverse research themes that range from classic topics, such as vulnerability analysis and classification; apps security; access control and filtering; cloud security; cyber-insurance and cyber threat intelligence; human-centric security and trust; and risk analysis.
This is the first book where mathematics and computer science are directly confronted and joined to tackle intricate problems in computer science with deep mathematical approaches. It contains a collection of refereed papers presented at the Colloquium on Mathematics and Computer Science held at the University of Versailles-St-Quentin on September 18-20, 2000. The colloquium was a meeting place for researchers in mathematics and computer science and thus an important opportunity to exchange ideas and points of view, and to present new approaches and new results in the common areas such as algorithms analysis, trees, combinatorics, optimization, performance evaluation and probabilities. The book is intended for a large public in applied mathematics, discrete mathematics and computer science, including researchers, teachers, graduate students and engineers. It provides an overview of the current questions in computer science and related modern mathematical methods. The range of applications is very wide and reaches beyond computer science.
This book constitutes the refereed proceedings of the 10th International Conference on Logic Programming, Artificial Intelligence, and Reasoning, LPAR 2003, held in Almaty, Kazakhstan in September 2003. The 27 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 65 submissions. The papers address all current issues in logic programming, automated reasoning, and AI logics in particular description logics, proof theory, logic calculi, formal verification, model theory, game theory, automata, proof search, constraint systems, model checking, and proof construction.
This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security.
This book constitutes the refereed proceedings of the 12th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2010, held in New York, USA, in September 2010. The 39 revised full papers were carefully reviewed and selected from 90 submissions. The papers address all safety and security-related aspects of self-stabilizing systems in various areas. The most topics related to self-* systems. The tracks were: self-stabilization; self-organization; ad-hoc, sensor, and dynamic networks; peer to peer; fault-tolerance and dependable systems; safety and verification; swarm, amorphous, spatial, and complex systems; security; cryptography, and discrete distributed algorithms.
This book constitutes the refereed proceedings of the Third International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2022, held in Bizerte, Tunisia, in February 2022. Due to the COVID-19 pandemic the conference was held online. The 5 full papers included in this volume were carefully reviewed and selected from 14 submissions. The volume also presents one invited paper. The papers are organized in topical sections on emerging networks and communications; cyber security of connected objects.
This book constitutes the refereed proceedings of the 40th International Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2014, held in Nový Smokovec, Slovakia, in January 2014. The 40 revised full papers presented in this volume were carefully reviewed and selected from 104 submissions. The book also contains 6 invited talks. The contributions covers topics as: Foundations of Computer Science, Software and Web Engineering, as well as Data, Information and Knowledge Engineering and Cryptography, Security and Verification.