You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 10th International Symposium on Algorithms and Computation, ISAAC'99, held in Chennai, India, in December 1999. The 40 revised full papers presented together with four invited contributions were carefully reviewed and selected from 71 submissions. Among the topics covered are data structures, parallel and distributed computing, approximation algorithms, computational intelligence, online algorithms, complexity theory, graph algorithms, computational geometry, and algorithms in practice.
This book constitutes the refereed proceedings of the Second International Conference on Pattern Recognition and Machine Intelligence, PReMI 2007, held in Kolkata, India in December 2007. The 82 revised papers presented were carefully reviewed and selected from 241 submissions. The papers are organized in topical sections on pattern recognition, image analysis, soft computing and applications, data mining and knowledge discovery, bioinformatics, signal and speech processing, document analysis and text mining, biometrics, and video analysis.
This book constitutes the refereed proceedings of the 18th Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS'98, held in Chennai, India, in December 1998. The 28 revised full papers presented were carefully selected from a total of 93 submissions; also included are six invited contributions. The papers deal with theoretical topics ranging from discrete mathematics and algorithmic aspects to software engineering, program semantics and mathematical logic.
This book constitutes the refereed proceedings of the International Workshop on Multimedia Content Representation, Classification and Security, MRCS 2006. The book presents 100 revised papers together with 4 invited lectures. Coverage includes biometric recognition, multimedia content security, steganography, watermarking, authentication, classification for biometric recognition, digital watermarking, content analysis and representation, 3D object retrieval and classification, representation, analysis and retrieval in cultural heritage, content representation, indexing and retrieval, and more.
This book constitutes the refereed proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2005, held in Chennai, India in December 2005. The 37 revised full papers presented were carefully reviewed and selected from 237 submissions. The papers are organized in topical sections on algebra and number theory, multiparty computation, zero knowledge and secret sharing, information and quantum theory, privacy and anonymity, cryptanalytic techniques, stream cipher cryptanalysis, block ciphers and hash functions, bilinear maps, key agreement, provable security, and digital signatures.
The Third International Conference on Network Security and Applications (CNSA-2010) focused on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding modern security threats and countermeasures, and establishing new collaborations in these areas. Authors are invited to contribute to the conference by submitting articles that illustrate research results, projects, survey work and industrial experiences describing significant advances in the areas of security and its applications, including: • Network and Wireless N...
As a vibrant area of computer science which continues to develop rapidly, AI is a field in which fresh ideas and new perspectives are of particular interest. This book presents the proceedings of the 8th European Starting AI Researcher Symposium (STAIRS 2016), held as a satellite event of the 22nd European Conference on Artificial Intelligence (ECAI) in The Hague, the Netherlands, in August 2016. What is unique about the STAIRS symposium is that the principal author of every submitted paper must be a young researcher who either does not yet hold a Ph.D., or who has obtained their Ph.D. during the year before the submission deadline for papers. The book contains 21 accepted papers; Part I inc...
This book constitutes the refereed proceedings of the 8th Annual European Symposium on Algorithms, ESA 2000, held in Saarbrcken, Germany in September 2000. The 39 revised full papers presented together with two invited papers were carefully reviewed and selected for inclusion in the book. Among the topics addressed are parallelism, distributed systems, approximation, combinatorial optimization, computational biology, computational geometry, external-memory algorithms, graph algorithms, network algorithms, online algorithms, data compression, symbolic computation, pattern matching, and randomized algorithms.
This book constitutes the refereed proceedings of the 17th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, AAECC-17, held in Bangalore, India, in December 2007. The 33 revised full papers presented together with 8 invited papers were carefully reviewed and selected from 61 submissions. Among the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic geometry codes; algebra: rings and fields, polynomials, permutations, lattices; cryptography: cryptanalysis and complexity; computational algebra: algebraic algorithms and transforms; sequences and boolean functions.
This book provides readers with a brief account of the history of Language Identification (LI) research and a survey of the features and methods most used in LI literature. LI is the problem of determining the language in which a document is written and is a crucial part of many text processing pipelines. The authors use a unified notation to clarify the relationships between common LI methods. The book introduces LI performance evaluation methods and takes a detailed look at LI-related shared tasks. The authors identify open issues and discuss the applications of LI and related tasks and proposes future directions for research in LI.