You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The four volume set LNAI 3681, LNAI 3682, LNAI 3683, and LNAI 3684 constitute the refereed proceedings of the 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005, held in Melbourne, Australia in September 2005. The 716 revised papers presented were carefully reviewed and selected from nearly 1400 submissions. The papers present a wealth of original research results from the field of intelligent information processing in the broadest sense; topics covered in the fourth volume are innovations in intelligent systems and their applications, data mining and soft computing applications, skill acquisition and ubiquitous human computer interactio...
Annotation The four volume set LNAI 3681, LNAI 3682, LNAI 3683, and LNAI 3684 constitute the refereed proceedings of the 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005, held in Melbourne, Australia in September 2005. The 716 revised papers presented were carefully reviewed and selected from nearly 1400 submissions. The papers present a wealth of original research results from the field of intelligent information processing in the broadest sense; topics covered in the first volume are intelligent design support systems, data engineering, knowledge engineering and ontologies, knowledge discovery and data mining, advanced network applic...
Shooting to Kill? Policing, Firearms and Armed Response explores the dilemma of armed response policing in the UK, and policing in a gun culture. Offers the first critical exploration of the ACPO code of guidance on Police Use of Firearms and other tactical manuals Includes interviews with senior police firearms managers and critical case studies of police firearms incidents Features the first in-depth, academic analysis of the Stockwell shooting incident and the Kratos policy Provides a review of key developments in armed response policing around the world Describes the crucial phases in armed response policy development in Britain and explores the consequences of arming the police
Interoperability: the ability of a system or a product to work with other systems or products without special effort from the user is a key issue in manufacturing and industrial enterprise generally. It is fundamental to the production of goods and services quickly and at low cost at the same time as maintaining levels of quality and customisation. Composed of 40 papers of international authorship, Interoperability of Enterprise Software and Applications ranges from academic research through case studies to industrial experience of interoperability. Many of the papers have examples and illustrations calculated to deepen understanding and generate new ideas. A concise reference to the state of the art in software interoperability, Interoperability of Enterprise Software and Applications will be of great value to engineers and computer scientists working in manufacturing and other process industries and to software engineers and electronic and manufacturing engineers working in the academic environment.
This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas. HCII 2014 received a total of 4766 submissions, of which 1476 papers and 220 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 38 papers presented in the HAS 2014 proceedings are organized in topical sections named: usable security; authentication and passwords; security policy and awareness; human behaviour in cyber security and privacy issues.
The papers in this volume are the refereed papers presented at AI-2012, the Thirty-second SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence, held in Cambridge in December 2012 in both the technical and the application streams. They present new and innovative developments and applications, divided into technical stream sections on Data Mining, Data Mining and Machine Learning, Planning and Optimisation, and Knowledge Management and Prediction, followed by application stream sections on Language and Classification, Recommendation, Practical Applications and Systems, and Data Mining and Machine Learning. The volume also includes the text of short papers presented as posters at the conference. This is the twenty-ninth volume in the Research and Development in Intelligent Systems series, which also incorporates the twentieth volume in the Applications and Innovations in Intelligent Systems series. These series are essential reading for those who wish to keep up to date with developments in this important field.
The papers in this volume are the refereed application papers presented at AI-2005, the Twenty-fifth SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence, held in Cambridge in December 2005. The papers present new and innovative developments in the field, divided into sections on Synthesis and Prediction, Scheduling and Search, Diagnosis and Monitoring, Classification and Design, and Analysis and Evaluation. This is the thirteenth volume in the Applications and Innovations series. The series serves as a key reference on the use of AI Technology to enable organisations to solve complex problems and gain significant business benefits. The Technical Stream papers are published as a companion volume under the title Research and Development in Intelligent Systems XXII.
The papers in this volume are the refereed papers presented at AI-2016, the Thirty-sixth SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence, held in Cambridge in December 2016 in both the technical and the application streams. They present new and innovative developments and applications, divided into technical stream sections on Knowledge Discovery and Data Mining, Sentiment Analysis and Recommendation, Machine Learning, AI Techniques, and Natural Language Processing, followed by application stream sections on AI for Medicine and Disability, Legal Liability and Finance, Telecoms and eLearning, and Genetic Algorithms in Action. The volume also includes the text of short papers presented as posters at the conference. This is the thirty-third volume in the Research and Development in Intelligent Systems series, which also incorporates the twenty-fourth volume in the Applications and Innovations in Intelligent Systems series. These series are essential reading for those who wish to keep up to date with developments in this important field.
Volume 52 is an annual survey of cutting-edge issues by preeminent criminology scholars. Since 1979, Crime and Justice has presented a review of the latest international research, providing expertise to enhance the work of sociologists, psychologists, criminal lawyers, justice scholars, and political scientists. The series explores a full range of issues concerning crime, its causes, and its cures. In both the review and the thematic volumes, Crime and Justice offers an interdisciplinary approach to address core issues in criminology.
This book constitutes the refereed proceedings of the First International Conference on E-learning and Games, Edutainment 2006, held in Hangzhou, China in April 2006. The 121 revised full papers and 52 short papers presented together with the abstracts of 3 invited papers and those of the keynote speeches cover a wide range of topics, including e-learning platforms and tools, learning resource management, practice and experience sharing, e-learning standards, and more.