You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In past twenty years or so, information technology has influenced and changed every aspect of our lives and our cultures. Without various IT-based applications, we would find it difficult to keep information stored securely, to process information and business efficiently, and to communicate information conveniently. In the future world, ITs and information engineering will play a very important role in convergence of computing, communication, business and all other computational sciences and application and it also will influence the future world's various areas, including science, engineering, industry, business, law, politics, culture and medicine. The International Conference on Informat...
TheInternationalConferenceonRoughSetandKnowledgeTechnology(RSKT) has been held every year since 2006. RSKT serves as a major forum that brings researchers and industry practitioners together to discuss and deliberate on fundamental issues of knowledge processing and management and knowled- intensive practical solutions in the current knowledge age. Experts from around the world meet to present state-of-the-art scienti?c results, to nurture academic and industrial interaction, and to promote collaborative research in rough sets and knowledge technology. The ?rst RSKT was held in Chongqing, China, f- lowed by RSKT 2007 in Toronto, Canada, RSKT 2008 in Chengdu, China and RSKT 2009 in Gold Coast...
This two volume set (CCIS 623 and 634) constitutes the refereed proceedings of the Second International Conference of Young Computer Scientists, Engineers and Educators, ICYCSEE 2016, held in Harbin, China, in August 2016. The 91 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers are organized in topical sections on Research Track (Part I) and Education Track, Industry Track, and Demo Track (Part II) and cover a wide range of topics related to social computing, social media, social network analysis, social modeling, social recommendation, machine learning, data mining.
This two-volume set of LNCS 12736-12737 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 93 full papers and 29 short papers presented in this two-volume proceedings was carefully reviewed and selected from 1013 submissions. Overall, a total of 224 full and 81 short papers were accepted for ICAIS 2021; the other accepted papers are presented in CCIS 1422-1424. The papers were organized in topical sections as follows: Part I: Artificial intelligence; and big data Part II: Big data; cloud computing and security; encryption and cybersecurity; information hiding; IoT security; and multimedia forensics
This book constitutes the refereed proceedings of the 9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014, held in Harbin, China, in June 2014. The 41 revised full papers presented together with 30 invited papers were carefully reviewed and selected from 134 submissions. The papers cover a wide range of topics including cognitive radio networks, wireless sensor networks, cyber-physical systems, distributed and localized algorithm design and analysis, information and coding theory for wireless networks, localization, mobile cloud computing, topology control and coverage, security and privacy, underwater and underground networks, vehicular networks, information processing and data management, programmable service interfaces, energy-efficient algorithms, system and protocol design, operating system and middle-ware support and experimental test-beds and models.
This two-volume set LNCS 13069-13070 constitutes selected papers presented at the First CAAI International Conference on Artificial Intelligence, held in Hangzhou, China, in June 2021. Due to the COVID-19 pandemic the conference was partially held online. The 105 papers were thoroughly reviewed and selected from 307 qualified submissions. The papers are organized in topical sections on applications of AI; computer vision; data mining; explainability, understandability, and verifiability of AI; machine learning; natural language processing; robotics; and other AI related topics.
2012 International Conference on Affective Computing and Intelligent Interaction (ICACII 2012) was the most comprehensive conference focused on the various aspects of advances in Affective Computing and Intelligent Interaction. The conference provided a rare opportunity to bring together worldwide academic researchers and practitioners for exchanging the latest developments and applications in this field such as Intelligent Computing, Affective Computing, Machine Learning, Business Intelligence and HCI. This volume is a collection of 119 papers selected from 410 submissions from universities and industries all over the world, based on their quality and relevancy to the conference. All of the papers have been peer-reviewed by selected experts.
With the increased use of technology in modern society, high volumes of multimedia information exists. It is important for businesses, organizations, and individuals to understand how to optimize this data and new methods are emerging for more efficient information management and retrieval. Information Retrieval and Management: Concepts, Methodologies, Tools, and Applications is an innovative reference source for the latest academic material in the field of information and communication technologies and explores how complex information systems interact with and affect one another. Highlighting a range of topics such as knowledge discovery, semantic web, and information resources management, this multi-volume book is ideally designed for researchers, developers, managers, strategic planners, and advanced-level students.
Since databases are the primary repositories of information for today’s organizations and governments, database security has become critically important. Introducing the concept of multilevel security in relational databases, this book provides a comparative study of the various models that support multilevel security policies in the relational database—illustrating the strengths and weaknesses of each model. Multilevel Security for Relational Databases covers multilevel database security concepts along with many other multilevel database security models and techniques. It presents a prototype that readers can implement as a tool for conducting performance evaluations to compare multilev...
This book constitutes the refereed proceedings of the 8th International Conference on Intelligent Computing, ICIC 2012, held in Huangshan, China, in July 2012. The 85 revised full papers presented were carefully reviewed and selected from 753 submissions. The papers are organized in topical sections on neural networks, evolutionar learning and genetic algorithms, granular computing and rough sets, biology inspired computing and optimization, nature inspired computing and optimization, cognitive science and computational neuroscience, knowledge discovery and data mining, quantum computing, machine learning theory and methods, healthcare informatics theory and methods, biomedical informatics theory and methods, complex systems theory and methods, intelligent computing in signal processing, intelligent computing in image processing, intelligent computing in robotics, intelligent computing in computer vision, intelligent agent and web applications, special session on advances in information security 2012.