You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This is the proceedings of the International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 2006. The book presents 165 revised full papers, carefully chosen and reviewed, organized in topical sections on fuzzy systems, fuzzy-neuro-evolutionary hybrids, supervised, unsupervised and reinforcement learning, intelligent agent and Web applications, intelligent fault diagnosis, natural language processing and expert systems, natural language human-machine interface using artificial neural networks, and intelligent financial engineering.
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building; network and protocol security; mobile network security; network survivability, other critical theories and standard systems; credible assessment; credible measurement and metrics; trusted systems; trusted networks; trusted mobile networks; trusted routing; trusted software; trusted operating systems; trusted storage; fault-tolerant computing and other key technologies; trusted e-commerce and e-government; trusted logistics; trusted internet of things; trusted cloud and other trusted services and applications.
This book constitutes the refereed proceedings of the 7th European Conference on Case-Based Reasoning, ECCBR 2004, held in Madrid, Spain in August/September 2004. The 56 revised full papers presented together with an invited paper and the abstract of an invited talk were carefully reviewed and selected from 85 submissions. All current issues in case-based reasoning, ranging from theoretical and methodological issues to advanced applications in various fields are addressed.
The present book includes a set of selected papers from the fourth “International Conference on Informatics in Control Automation and Robotics” (ICINCO 2009), held in Milan, Italy, from 2 to 5 July 2009. The conference was organized in three simultaneous tracks: “Intelligent Control Systems and Optimization”, “Robotics and Automation” and “Systems Modeling, Signal Processing and Control”. The book is based on the same structure. ICINCO received 365 paper submissions, not including those of workshops, from 55 countries, in all continents. After a double blind paper review performed by the Program Committee only 34 submissions were accepted as full papers and thus selected for ...
This book constitutes the refereed proceedings of the First International Information Security Practice and Experience Conference, ISPEC 2005, held in Singapore in April 2005. The 35 revised full papers presented were carefully reviewed and selected from more than 120 submissions. The papers are organized in topical sections on network security, cryptographic techniques, secure architectures, access control, intrusion detection, data security, and applications and case studies.
Artificial neural networks are used to model systems that receive inputs and produce outputs. The relationships between the inputs and outputs and the representation parameters are critical issues in the design of related engineering systems, and sensitivity analysis concerns methods for analyzing these relationships. Perturbations of neural networks are caused by machine imprecision, and they can be simulated by embedding disturbances in the original inputs or connection weights, allowing us to study the characteristics of a function under small perturbations of its parameters. This is the first book to present a systematic description of sensitivity analysis methods for artificial neural networks. It covers sensitivity analysis of multilayer perceptron neural networks and radial basis function neural networks, two widely used models in the machine learning field. The authors examine the applications of such analysis in tasks such as feature selection, sample reduction, and network optimization. The book will be useful for engineers applying neural network sensitivity analysis to solve practical problems, and for researchers interested in foundational problems in neural networks.
This book constitutes the refereed proceedings of the 13th International Conference on Machine Learning and Cybernetics, Lanzhou, China, in July 2014. The 45 revised full papers presented were carefully reviewed and selected from 421 submissions. The papers are organized in topical sections on classification and semi-supervised learning; clustering and kernel; application to recognition; sampling and big data; application to detection; decision tree learning; learning and adaptation; similarity and decision making; learning with uncertainty; improved learning algorithms and applications.
None