You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 10th International Conference on Electronic Commerce and Web Technologies, EC-Web 2009, held in Linz, Austria, in September, 2009 in conjunction with Dexa 2009. The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 61submissions. The papers are organized in nine topical sessions on e-payments and trust, domain knowledge and metadata exploitation, design and modelling of enterprise and distributed systems, electronic commerce and web 3.0, collaboration-based approaches, recommender systems modelling, reputation and fraud detection, recommender systems and the social web, and recommender systems in action.
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2012, held in Prague, Czech Republic, in August 2012. The 50 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: cross-domain applications: aspects of modeling and validation; trust,security, privacy, and safety; mobile applications; data processing and management; retrieval and complex query processing; e-commerce; and papers from the colocated International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2012.
Data science, data engineering and knowledge engineering requires networking and communication as a backbone and have wide scope of implementation in engineering sciences. Keeping this ideology in preference, this book includes the insights that reflect the advances in these fields from upcoming researchers and leading academicians across the globe. It contains high-quality peer-reviewed papers of ‘International Conference on Recent Advancement in Computer, Communication and Computational Sciences (ICRACCCS 2016)’, held at Janardan Rai Nagar Rajasthan Vidyapeeth University, Udaipur, India, during 25–26 November 2016. The volume covers variety of topics such as Advanced Communication Networks, Artificial Intelligence and Evolutionary Algorithms, Advanced Software Engineering and Cloud Computing, Image Processing and Computer Vision, and Security. The book will help the perspective readers from computer industry and academia to derive the advances of next generation communication and computational technology and shape them into real life applications.
This book constitutes the refereed proceedings of the 7th International Symposium on Intelligence Computation and Applications, ISICA 2015, held in Guangzhou, China, in November 2015. The 77 revised full papers presented were carefully reviewed and selected from 189 submissions. The papers feature the most up-to-date research in analysis and theory of evolutionary computation, neural network architectures and learning; neuro-dynamics and neuro-engineering; fuzzy logic and control; collective intelligence and hybrid systems; deep learning; knowledge discovery; learning and reasoning.
Biometrics provide quantitative representations of human features, physiological and behavioral. This book is a compilation of biometric technologies developed by various research groups in Tecnologico de Monterrey, Mexico. It provides a summary of biometric systems as a whole, explaining the principles behind physiological and behavioral biometrics and exploring different types of commercial and experimental technologies and current and future applications in the fields of security, military, criminology, healthcare education, business, and marketing. Examples of biometric systems using brain signals or electroencephalography (EEG) are given. Mobile and home EEG use in children’s natural ...
This book constitutes the refereed proceedings of the 5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys, held in Guangzhou, China, in November 2019. The volume presents 39 full papers, which were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on dependability and security fundamentals and technologies; dependable and secure systems; dependable and secure applications; dependability and security measures and assessments; explainable artificial inteligence for cyberspace.
This book provides comprehensive coverage of the latest advances and trends in information technology, science and engineering. Specifically, it addresses a number of broad themes, including multi-modal informatics, data mining, agent-based and multi-agent systems for health and education informatics, which inspire the development of intelligent information technologies. The contributions cover a wide range of topics such as AI applications and innovations in health and education informatics; data and knowledge management; multi-modal application management; and web/social media mining for multi-modal informatics. Outlining promising future research directions, the book is a valuable resource for students, researchers and professionals, and a useful reference guide for newcomers to the field. This book is a compilation of the papers presented in the 2021 International Conference on Multi-modal Information Analytics, held in Huhehaote, China, on April 23–24, 2021.
This volume constitutes the refereed proceedings of two workshops: the International Cross-Domain Conference and Workshop on Availability, Reliability and Security, CD-ARES 2014, and the 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2014, co-located with the International Conference on Availability, Reliability and Security, ARES 2014, held in Fribourg, Switzerland, in September 2014. The 23 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers deal with knowledge management, software security, mobile and social computing, enterprise information systems, homeland security and information processing.
This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.
The three-volume sets constitute the refereed proceedings of the 15th International Conference on Knowledge Science, Engineering and Management, KSEM 2022, held in Singapore, during August 6–8, 2022. The 169 full papers presented in these proceedings were carefully reviewed and selected from 498 submissions. The papers are organized in the following topical sections: Volume I:Knowledge Science with Learning and AI (KSLA) Volume II:Knowledge Engineering Research and Applications (KERA) Volume III:Knowledge Management with Optimization and Security (KMOS)