You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
It is by now an obvious observation that much of the world depends on information technology. Our infrastructure relies on IT: our buildings, finance systems, roads, airplanes, cars, televisions, washing machines and bread makers; as does much of what we do: our banking, learning and communicating. Almost everyone today uses information technology, but few know how it works, and very few indeed understand the mysteries of how to build new systems. This imbalance between ‘users’ and ‘knowers’ grows worse every year. With the ‘dot com collapse’, the number of students studying computers, and information technology more generally, has been shrinking steadily. In the long run, this t...
The last few years have seen an extraordinary growth in many areas of complex systems. In the field of synergetics and cooperative behaviour in neural systems a new vocabulary emerged to describe discoveries of wide-ranging and fundamental phenomena, like for example artificial life, biocomplexity, cellular automata, chaos, criticality, fractals, learning systems, neural networks, non-linear dynamics, parallel computation, percolation, self-organization.One of the contributing factors to this growth is the extraordinary increase in computing power. Previously intractable non-linear systems are now amenable to analysis and simulation and parallel computers are ever more important in these areas.The book contains papers exploring many aspects of complex systems, covering theory and applications and deal with material drawn from many different disciplines and specialities.
This book constitutes the refereed proceedings of the 15th Australasian Conference on Information Security and Privacy, ACISP 2010, held in Sydney, Australia, in July 2010. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric key encryption; hash functions; public key cryptography; protocols; and network security.
Annotation A comprehensive and broad introduction to computer and intrusion forensics, covering the areas of law enforcement, national security and corporate fraud, this practical book helps professionals understand case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, and machine learning.
This book constitutes the refereed proceedings of the 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2004, held in Ottawa, Canada, in May 2004. The 129 revised full papers presented were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections on neural networks, bioinformatics, data mining, general applications, autonomous agents, intelligent systems, knowledge processing and NLP, intelligent user interfaces, evolutionary computing, fuzzy logic, human-roboter interaction, computer vision and image processing, machine learning and case-based reasoning, heuristic search, security, Internet applications, planning and scheduling, constraint satisfaction, e-learning, expert systems, applications to design, machine learning, and image processing.
InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.
Theraplay is a form of structured play therapy designed to strengthen the attachment between parents and their child. Dr. Evangeline Munns, a Theraplay therapist and trainer, introduces this treatment method in its traditional format of individual child and parent sessions. Its simple, action-oriented, and visual activities are presented in an atmosphere of playfulness and fun, designed to easily engage both parent and child. The adaptability of this approach has led to its innovative application in working with various populations (failure to-thrive infants, sexually abused children), within various formats (siblings, families, multi-families, groups), and in various settings (private practice, mental health centers, schools). Emphasizing enhanced self-esteem, trust, and confidence, Theraplay techniques are clearly and creatively presented with rich clinical detail in this volume.
This book is based on the workshop on New Approaches to Learning for Natural Language Processing, held in conjunction with the International Joint Conference on Artificial Intelligence, IJCAI'95, in Montreal, Canada in August 1995. Most of the 32 papers included in the book are revised selected workshop presentations; some papers were individually solicited from members of the workshop program committee to give the book an overall completeness. Also included, and written with the novice reader in mind, is a comprehensive introductory survey by the volume editors. The volume presents the state of the art in the most promising current approaches to learning for NLP and is thus compulsory reading for researchers in the field or for anyone applying the new techniques to challenging real-world NLP problems.
Support vector machines (SVMs) are one of the most active research areas in machine learning. SVMs have shown good performance in a number of applications, including text and image classification. However, the learning capability of SVMs comes at a cost – an inherent inability to explain in a comprehensible form, the process by which a learning result was reached. Hence, the situation is similar to neural networks, where the apparent lack of an explanation capability has led to various approaches aiming at extracting symbolic rules from neural networks. For SVMs to gain a wider degree of acceptance in fields such as medical diagnosis and security sensitive areas, it is desirable to offer a...
The book covers three major topics crucial for contemporary syntactic research. Firstly, it offers a sketch of a general theory of dependency in natural language. Different types of linguistic dependencies are distinguished (semantic, syntactic, and morphological), the criteria for their recognition are formulated, and all possible combinations are discussed in some detail. Secondly, it demonstrates the application of the general theory in two specific domains: establishing the system of Surface-Syntactic Relations in French and linear positioning of clitics in Serbian. Thirdly, it presents a formal sketch of Head-Driven Phrase-Structure Grammar modelled in terms of syntactic dependencies.