Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Computing and Combinatorics
  • Language: en
  • Pages: 613

Computing and Combinatorics

  • Type: Book
  • -
  • Published: 2003-05-15
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 7th Annual International Conference on Computing and Combinatorics, COCOON 2001, held in Guilin, China, in August 2001.The 50 revised full papers and 16 short papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on complexity theory, computational biology, computational geometry, data structures and algorithms, games and combinatorics, graph algorithms and complexity, graph drawing, graph theory, online algorithms, randomized and average-case algorithms, Steiner trees, systems algorithms and modeling, and computability.

Parallel Processing and Applied Mathematics
  • Language: en
  • Pages: 1437

Parallel Processing and Applied Mathematics

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Parallel Processing and Applied Mathematics, PPAM 2007, held in Gdansk, Poland, in September 2007. The 63 revised full papers of the main conference presented together with 85 revised workshop papers were carefully reviewed and selected from over 250 initial submissions. The papers are organized in topical sections on parallel/distributed architectures and mobile computing, numerical algorithms and parallel numerics, parallel and distributed non-numerical algorithms, environments and tools for as well as applications of parallel/distributed/grid computing, evolutionary computing, ...

Computational Intelligence in Security for Information Systems
  • Language: en
  • Pages: 220

Computational Intelligence in Security for Information Systems

The Second International Workshop on Computational Intelligence for Security in Information Systems (CISIS’09) presented the most recent developments in the - namically expanding realm of several fields such as Data Mining and Intelligence, Infrastructure Protection, Network Security, Biometry and Industrial Perspectives. The International Workshop on Computational Intelligence for Security in Infor- tion Systems (CISIS) proposes a forum to the different communities related to the field of intelligent systems for security. The global purpose of CISIS conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading industries ac...

Data and Applications Security XXII
  • Language: en
  • Pages: 356

Data and Applications Security XXII

This book constitutes the refereed proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security held in London, UK, in July 2008. The 22 revised full papers presented together with 1 keynote lecture and 1 invited talk were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections on access control, audit and logging, privacy, systems security, certificate management, trusted computing platforms, security policies and metrics, as well as Web and pervasive systems.

Computational Intelligence in Security for Information Systems
  • Language: en
  • Pages: 324

Computational Intelligence in Security for Information Systems

This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Málaga, in June 2011 as a satellite event of IWANN 2011, the International Work-Conference on Artificial and Natural Neural Networks. The 38 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. The papers are organized in topical sections on machine learning and intelligence, network security, cryptography, securing software, and applications of intelligent methods for security.

Computational Intelligence in Security for Information Systems 2010
  • Language: en
  • Pages: 241

Computational Intelligence in Security for Information Systems 2010

rd The 3 International Conference on Computational Intelligence in Security for Information Systems (CISIS 2010) provided a broad and interdisciplinary forum to present the most recent developments in several very active scientific areas such as Machine Learning, Infrastructure Protection, Intelligent Methods in Energy and Transportation, Network Security, Biometry, Cryptography, High-performance and Grid Computing, and Industrial Perspective among others. The global purpose of CISIS series of conferences has been to form a broad and interdisciplinary meeting ground offering the opportunity to interact with the leading research team and industries actively involved in the critical area of se...

Computer Aided Systems Theory – EUROCAST 2005
  • Language: en
  • Pages: 642

Computer Aided Systems Theory – EUROCAST 2005

This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Computer Aided Systems Theory, EUROCAST 2005, held in Las Palmas de Gran Canaria, Spain in February 2005. The 83 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on formal approaches in modelling, intelligent information systems, information applications components, cryptography and spectral analysis, computer vision, biocomputing, intelligent vehicular systems, robotic soccer, robotics and control.

International Joint Conference
  • Language: en
  • Pages: 621

International Joint Conference

  • Type: Book
  • -
  • Published: 2015-05-31
  • -
  • Publisher: Springer

This volume of Advances in Intelligent and Soft Computing contains accepted papers presented at the 8th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2015) and the 6th International Conference on European Transnational Education (ICEUTE 2015). These conferences were held in the beautiful and historic city of Burgos (Spain), in June 2015. The aim of the 8th CISIS conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of Computational Intelligence, Information Security, and Data Mining. The need for intelligent, flexible behaviour by large, complex systems, especia...

Financial Cryptography and Data Security
  • Language: en
  • Pages: 442

Financial Cryptography and Data Security

  • Type: Book
  • -
  • Published: 2010-07-16
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Financial Cryptography and Data Security, FC 2010, held in Tenerife, Canary Islands, Spain in January 2010. The 19 revised full papers and 15 revised short papers presented together with 1 panel report and 7 poster papers were carefully reviewed and selected from 130 submissions. The papers cover all aspects of securing transactions and systems and feature current research focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security.

Ubiquitous Computing and Ambient Intelligence
  • Language: en
  • Pages: 577

Ubiquitous Computing and Ambient Intelligence

  • Type: Book
  • -
  • Published: 2016-11-18
  • -
  • Publisher: Springer

This LNCS double volume LNCS 10069-10070 constitutes the refereed proceedings of the 10th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2016, which includes the International Work Conference on Ambient Assisted Living (IWAAL), and the International Conference on Am-bient Intelligence for Health (AmIHEALTH), held in Las Palmas de Gran Canaria, Spain, in November/December 2016. The 69 full papers presented together with 40 short papers and 5 doctoral consortium papers were carefully reviewed and selected from 145 submissions. UCAmI 2016 is focused on research topics related to ambient assisted living, internet of things, smart cities, ambient intelligence for health, human-computer interaction, ad-hoc and sensor networks, and security./div