You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book provides the reader with the fundamental knowledge in the area of deep learning with application to visual content mining. The authors give a fresh view on Deep learning approaches both from the point of view of image understanding and supervised machine learning. It contains chapters which introduce theoretical and mathematical foundations of neural networks and related optimization methods. Then it discusses some particular very popular architectures used in the domain: convolutional neural networks and recurrent neural networks. Deep Learning is currently at the heart of most cutting edge technologies. It is in the core of the recent advances in Artificial Intelligence. Visual i...
This book gathers outstanding research papers presented in the International Conference on Computational Intelligence and Emerging Power System (ICCIPS 2021), held on March 9-10, 2021, at Engineering College Ajmer. ICCIPS 2021 is jointly organized by the Department of CSE and Department of EE, Engineering College Ajmer, Rajasthan, India. The topics covered in the book are collective intelligence, soft computing, optimization, cloud computing, machine learning, intelligent software, robotics, data science, data security, big data analytics, natural language processing, renewable energy, signal processing, optimization methods for power system, smart grid, micro-grid, energy management, power system, monitoring system, load management, and distributed generation.
This book constitutes the revised selected papers from the 13th International Conference on Risks and Security of Internet and Systems, CRiSIS 2018, held in Arcachon, France, in October 2018. The 12 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 34 submissions. They cover diverse research themes that range from classic topics, such as vulnerability analysis and classification; apps security; access control and filtering; cloud security; cyber-insurance and cyber threat intelligence; human-centric security and trust; and risk analysis.
This book constitutes the refereed proceedings of the 13th International Colloquium on Theoretical Aspects of Computing, ICTAC 2016, held in Taipei, Taiwan, in October 2016. The 23 revised full papers presented together with two short papers, two invited papers and one abstract of an invited paper were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on program verification; design, synthesis and testing; calculi; specifications; composition and transformation; automata; temporal logics; tool and short papers.
This book constitutes the refereed proceedings of the 26th International Symposium on Distributed Computing, DISC 2012, held in Salvador, Brazil, in October 2012. The 27 revised full papers presented together with 24 brief announcements were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections on shared memory, mobile agents and overlay networks, wireless and multiple access channel networks, dynamic networks, distributed graph algorithms, wireless and loosely connected networks, robots, and lower bounds and separation.
The popularity of Android mobile phones has caused more cybercriminals to create malware applications that carry out various malicious activities. The attacks, which escalated after the COVID-19 pandemic, proved there is great importance in protecting Android mobile devices from malware attacks. Intelligent Mobile Malware Detection will teach users how to develop intelligent Android malware detection mechanisms by using various graph and stochastic models. The book begins with an introduction to the Android operating system accompanied by the limitations of the state-of-the-art static malware detection mechanisms as well as a detailed presentation of a hybrid malware detection mechanism. The...
This book constitutes the refereed proceedings of the 10th International Conference on Logic Programming, Artificial Intelligence, and Reasoning, LPAR 2003, held in Almaty, Kazakhstan in September 2003. The 27 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 65 submissions. The papers address all current issues in logic programming, automated reasoning, and AI logics in particular description logics, proof theory, logic calculi, formal verification, model theory, game theory, automata, proof search, constraint systems, model checking, and proof construction.
This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security.
This book constitutes the refereed proceedings of the 12th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2010, held in New York, USA, in September 2010. The 39 revised full papers were carefully reviewed and selected from 90 submissions. The papers address all safety and security-related aspects of self-stabilizing systems in various areas. The most topics related to self-* systems. The tracks were: self-stabilization; self-organization; ad-hoc, sensor, and dynamic networks; peer to peer; fault-tolerance and dependable systems; safety and verification; swarm, amorphous, spatial, and complex systems; security; cryptography, and discrete distributed algorithms.
This book constitutes the refereed proceedings of the Third International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2022, held in Bizerte, Tunisia, in February 2022. Due to the COVID-19 pandemic the conference was held online. The 5 full papers included in this volume were carefully reviewed and selected from 14 submissions. The volume also presents one invited paper. The papers are organized in topical sections on emerging networks and communications; cyber security of connected objects.