You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Advances in machine learning techniques and ever-increasing computing power has helped create a new generation of hardware and software technologies with practical applications for nearly every industry. As the progress has, in turn, excited the interest of venture investors, technology firms, and a growing number of clients, implementing intelligent automation in both physical and information systems has become a must in business. Handbook of Research on Smart Technology Models for Business and Industry is an essential reference source that discusses relevant abstract frameworks and the latest experimental research findings in theory, mathematical models, software applications, and prototypes in the area of smart technologies. Featuring research on topics such as digital security, renewable energy, and intelligence management, this book is ideally designed for machine learning specialists, industrial experts, data scientists, researchers, academicians, students, and business professionals seeking coverage on current smart technology models.
This nine-volume set LNCS 14104 – 14112 constitutes the refereed workshop proceedings of the 23rd International Conference on Computational Science and Its Applications, ICCSA 2023, held at Athens, Greece, during July 3–6, 2023. The 350 full papers and 29 short papers and 2 PHD showcase papers included in this volume were carefully reviewed and selected from a total of 876 submissions. These nine-volumes includes the proceedings of the following workshops: Advances in Artificial Intelligence Learning Technologies: Blended Learning, STEM, Computational Thinking and Coding (AAILT 2023); Advanced Processes of Mathematics and Computing Models in Complex Computational Systems (ACMC 2023); Art...
The aim of the MATA workshops series is to provide a unique opportunity for researchers from the IT, Internet, and telecommunications domain, as well as related software and application developers and service providers to discuss the advances in agent technologies and their applications in next generation mobile Internet and telecommunications. Since 1999 in Canada, MATA workshops have contributed to the creation of a research community around mobile agents and their use in telecommunication applications. The 2003 workshop focused on recent developments in agent technologies and particularly the use of agent technologies within the ?elds of network - nagement, dynamic service provisioning an...
The five-volume set LNCS 3980-3984 constitutes the refereed proceedings of the International Conference on Computational Science and Its Applications, ICCSA 2006. The volumes present a total of 664 papers organized according to the five major conference themes: computational methods, algorithms and applications high performance technical computing and networks advanced and emerging applications geometric modelling, graphics and visualization information systems and information technologies. This is Part II.
This book constitutes the proceedings of the 10th International Symposium on Cyberspace Safety and Security, CSS 2018, held in Amalfi, Italy, in October 2018. The 25 full papers presented in this volume were carefully reviewed and selected from 79 submissions. The papers focus on cybersecurity; cryptography, data security, and biometric techniques; and social security, ontologies, and smart applications.
This volume constitutes the refereed proceedings of two workshops: the Second International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013) and the Third International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013) held within the framework of the IFIP 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2013, in Regensburg, Germany, in September 2013. The 16 revised papers presented at MoCrySEn 2013 were carefully reviewed and selected from 30 submissions. They deal with symmetric-key cryptography, public-key cryptography, algorithmic cryptanalysis, software and hardware implementation of cryptographic algorithms, database encryption, and interaction between cryptographic theory and implementation issues. The 15 papers presented at SeCIHD 2013 are organized in topical sections on cyber security and dependability, network security and privacy, and multimedia technology for homeland defense.
Amid the dynamic growth of artificial intelligence, this book presents a collection of findings and advancements from the second edition of the A2IA-Artificial Intelligence and Industrial Applications conference. The conference, hosted by ENSAM-Meknès at Moulay Ismail University, Morocco, fosters knowledge exchange in AI, focusing primarily on its industrial applications. Covering a wide range of topics, the book highlights the adaptable nature of AI and its increasing impact on industrial sectors. It brings together contributions from an international cohort of researchers, discussing themes such as intelligent manufacturing and maintenance, intelligent supply chain management, various mod...
This book constitutes the refereed joint proceedings of ten international workshops held in conjunction with the 4th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2006, held in Sorrento, Italy in December 2006. It contains 116 papers that contribute to enlarging the spectrum of the more general topics treated in the ISPA 2006 main conference.
This book constitutes the refereed proceedings of the International Conference on Information and Communication Technology, ICT-EurAsia 2013, and the collocation of AsiaARES 2013 as a special track on Availability, Reliability, and Security, held in Yogyakarta, Indonesia, in March 2013. The 62 revised full papers presented were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on e-society, software engineering, security and privacy, cloud and internet computing, knowledge management, dependable systems and applications, cryptography, privacy and trust management, network analysis and security, and multimedia security.