You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordi...
This book constitutes the thoroughly refereed post-workshop proceedings of the 21st International Workshop on Security Protocols, held in Cambridge, UK, in March 2013. The volume contains 14 revised papers with transcripts of the presentation and workshop discussion and an introduction, i.e. 15 contributions in total. The theme of the workshop was "What's Happening on the Other Channel?".
Machine Learning: An Artificial Intelligence Approach, Volume III presents a sample of machine learning research representative of the period between 1986 and 1989. The book is organized into six parts. Part One introduces some general issues in the field of machine learning. Part Two presents some new developments in the area of empirical learning methods, such as flexible learning concepts, the Protos learning apprentice system, and the WITT system, which implements a form of conceptual clustering. Part Three gives an account of various analytical learning methods and how analytic learning can be applied to various specific problems. Part Four describes efforts to integrate different learn...
This volume contains the proceedings of the European Conference on Machine Learning 1994, which continues the tradition of earlier meetings and which is a major forum for the presentation of the latest and most significant results in machine learning. Machine learning is one of the most important subfields of artificial intelligence and computer science, as it is concerned with the automation of learning processes. This volume contains two invited papers, 19 regular papers, and 25 short papers carefully reviewed and selected from in total 88 submissions. The papers describe techniques, algorithms, implementations, and experiments in the area of machine learning.
This book constitutes the refereed proceedings of the 9th International Symposium on Methodologies for Intelligent Systems, ISMIS '96, held in Zakopane, Poland, in June 1996. The 53 revised full papers presented were selected from a total of 124 submissions; also included are 10 invited papers by leading experts surveying the state of the art in the area. The volume covers the following areas: approximate reasoning, evolutionary computation, intelligent information systems, knowledge representation and integration, learning and knowledge discovery, and AI logics.
Program synthesis is a solution to the software crisis. If we had a program that develops correct programs from specifications, then program validation and maintenance would disappear from the software life-cycle, and one could focus on the more creative tasks of specification elaboration, validation, and maintenance, because replay of program development would be less costly. This monograph describes a novel approach to Inductive Logic Programming (ILP), which cross-fertilizes logic programming and machine learning. Aiming at the synthesis of recursive logic programs only, and this from incomplete information, we take a software engineering approach that is more appropriate than a pure artificial intelligence approach. This book is suitable as a secondary text for graduate level courses in software engineering and artificial intelligence, and as a reference for practitioners of program synthesis.
Wewishtothank AlfredHofmannandAnnaKramerofSpringer-Verlagfortheircooperationin publishing these proceedings. Finally, we gratefully acknowledge the nancial supportprovidedbythesponsorsofILP-99.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Security and Privacy in Mobile Information and Communication Systems (MOBISEC 2011) held in Aalborg, Denmark, in May 2011. The 15 revised full papers were carefully selected from numerous submissions and cover the most active areas of research in mobile security with its 3 focus areas machine-to-machine communication security, policies for mobile environments, and mobile user authentication and authorization.
This book constitutes the refereed proceedings of the 9th International Conference on Inductive Logic Programming, ILP-99, held in Bled, Slovenia, in June 1999. The 24 revised papers presented were carefully reviewed and selected from 40 submissions. Also included are abstracts of three invited contributions. The papers address all current issues in inductive logic programming and inductive learning, from foundational and methodological issues to applications, e.g. in natural language processing, knowledge discovery, and data mining.
This open access book constitutes the proceedings of the 23rd International Conference on Foundations of Software Science and Computational Structures, FOSSACS 2020, which took place in Dublin, Ireland, in April 2020, and was held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020. The 31 regular papers presented in this volume were carefully reviewed and selected from 98 submissions. The papers cover topics such as categorical models and logics; language theory, automata, and games; modal, spatial, and temporal logics; type theory and proof theory; concurrency theory and process calculi; rewriting theory; semantics of programming languages; program analysis, correctness, transformation, and verification; logics of programming; software specification and refinement; models of concurrent, reactive, stochastic, distributed, hybrid, and mobile systems; emerging models of computation; logical aspects of computational complexity; models of software security; and logical foundations of data bases.