You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The International Conference on Intelligent Computing (ICIC) was formed to p- vide an annual forum dedicated to the emerging and challenging topics in artificial intelligence, machine learning, bioinformatics, and computational biology, etc. It aims to bring together researchers and practitioners from both academia and ind- try to share ideas, problems and solutions related to the multifaceted aspects of intelligent computing. ICIC 2008, held in Shanghai, China, September 15–18, 2008, constituted the 4th International Conference on Intelligent Computing. It built upon the success of ICIC 2007, ICIC 2006 and ICIC 2005 held in Qingdao, Kunming and Hefei, China, 2007, 2006 and 2005, respectiv...
The International Conference on Intelligent Computing (ICIC) was formed to p- vide an annual forum dedicated to the emerging and challenging topics in artificial intelligence, machine learning, bioinformatics, and computational biology, etc. It aims to bring together researchers and practitioners from both academia and ind- try to share ideas, problems and solutions related to the multifaceted aspects of intelligent computing. ICIC 2008, held in Shanghai, China, September 15–18, 2008, constituted the 4th International Conference on Intelligent Computing. It built upon the success of ICIC 2007, ICIC 2006 and ICIC 2005 held in Qingdao, Kunming and Hefei, China, 2007, 2006 and 2005, respectiv...
This book constitutes the revised post-conference proceedings of the 15th International Workshop on Digital Forensics and Watermarking, IWDW 2016, held in Beijing, China, in September 2016. The 45 papers presented in this volume were carefully reviewed and selected from 70 submissions. The contributions are organized in topical sections on digital forensics, visual cryptography, reversible data hiding, and steganography and steganalysis.
The International Conference on Intelligent Computing (ICIC) was formed to p- vide an annual forum dedicated to the emerging and challenging topics in artificial intelligence, machine learning, bioinformatics, and computational biology, etc. It aims to bring together researchers and practitioners from both academia and ind- try to share ideas, problems and solutions related to the multifaceted aspects of intelligent computing. ICIC 2008, held in Shanghai, China, September 15–18, 2008, constituted the 4th International Conference on Intelligent Computing. It built upon the success of ICIC 2007, ICIC 2006 and ICIC 2005 held in Qingdao, Kunming and Hefei, China, 2007, 2006 and 2005, respectiv...
In this edited volume, we present the state-of-the-art views of the perspective of enterprise risk management, to include frameworks and controls in the ERM process with respect to supply chains, constructions, and project, energy, environmental and sustainable development risk management. The bulk of this volume is devoted to presenting a number of modeling approaches that have been (or could be) applied to enterprise risk management in construction.
This two volume set LNCS 10039 and LNCS 10040 constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Cloud Computing and Security, ICCCS 2016, held in Nanjing, China, during July 29-31, 2016. The 97 papers of these volumes were carefully reviewed and selected from 272 submissions. The papers are organized in topical sections such as: Information Hiding, Cloud Computing, Cloud Security, IOT Applications, Multimedia Applications, Multimedia Security and Forensics.
The Lost Generation is a vital component to understanding Maoism. The book provides a comprehensive account of the critical movement during which seventeen million young "educated" citydwellers were supposed to transform themselves into peasants, potentially for life. Bonnin closely examines the Chinese leadership's motivations and the methods that they used over time to implement their objectives, as well as the daytoday lives of those young people in the countryside, their difficulties, their doubts, their resistance and, ultimately, their revolt. The author draws on a rich and diverse array of sources, concluding with a comprehensive assessment of the movement that shaped an entire generation, including a majority of today's cultural, economic, and political elite.
This book constitutes the thoroughly refereed proceedings of the Third International Conference on High Performance Computing and Applications, HPCA 2015, held in Shanghai, China, in July 2015. The 24 revised full papers presented were carefully reviewed and selected from 50 submissions. The papers cover the following research areas: numerical algorithms and solutions; high performance and grid computing; novel approached to high performance computing; massive data storage and processing; hardware acceleration; applications.
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Digital-Forensics and Watermarking, IWDW 2012, held in Shanghai, China, during October/November 2012. The 42 revised papers (27 oral and 15 poster papers) were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on steganography and steganalysis; watermarking and copyright protection; forensics and anti-forensics; reversible data hiding; fingerprinting and authentication; visual cryptography.
Defect-Induced Magnetism in Oxide Semiconductors provides an overview of the latest advances in defect engineering to create new magnetic materials and enable new technological applications. First, the book introduces the mechanisms, behavior, and theory of magnetism in oxide semiconductors and reviews the methods of inducing magnetism in these materials. Then, strategies such as pulsed laser deposition and RF sputtering to grow oxide nanostructured materials with induced magnetism are discussed. This is followed by a review of the most relevant postdeposition methods to induce magnetism in oxide semiconductors including annealing, ion irradiation, and ion implantation. Examples of defect-in...