You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009. The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and Web services.
This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber Security, ML4CS 2020, held in Xi’an, China in October 2020. The 118 full papers and 40 short papers presented were carefully reviewed and selected from 360 submissions. The papers offer a wide range of the following subjects: Machine learning, security, privacy-preserving, cyber security, Adversarial machine Learning, Malware detection and analysis, Data mining, and Artificial Intelligence.
This two-volume set of LNCS 13393 and LNCS 13394 constitutes - in conjunction with the volume LNAI 13395 - the refereed proceedings of the 18th International Conference on Intelligent Computing, ICIC 2022, held in Xi'an, China, in August 2022. The 209 full papers of the three proceedings volumes were carefully reviewed and selected from 449 submissions. This year, the conference concentrated mainly on the theories and methodologies as well as the emerging applications of intelligent computing. Its aim was to unify the picture of contemporary intelligent computing techniques as an integral concept that highlights the trends in advanced computational intelligence and bridges theoretical research with applications. Therefore, the theme for this conference was “Advanced Intelligent Computing Technology and Applications”. Papers focused on this theme were solicited, addressing theories, methodologies, and applications in science and technology.
Irreducible to conventional labels usually applied to him, the Tang poet Du Fu (712–770) both defined and was defined by the literary, intellectual, and socio-political cultures of the Song dynasty (960–1279). Jue Chen not only argues in his work that Du Fu was constructed according to particular literary and intellectual agendas of Song literati but also that conventional labels applied to Du Fu do not accurately represent this construction campaign. He also discusses how Du Fu’s image as the greatest poet sheds unique light on issues that can deepen our understanding of the subtleties in the poetic culture of Song China.
This text provides a new proof of Glauberman's Z*-Theorem under the additional hypothesis that the simple groups involved in the centraliser of an isolated involution are known simple groups.
This book constitutes the proceedings of the third Sino-foreign-interchange Workshop on Intelligence Science and Intelligent Data Engineering, IScIDE 2012, held in Nanjing, China, in October 2012. The 105 papers presented were carefully peer-reviewed and selected from 429 submissions. Topics covered include pattern recognition; computer vision and image processing; machine learning and computational intelligence; knowledge discovery, data mining, and web mining; graphics and computer visualization; and multimedia processing and applications.
The authors consider the Schrödinger Map equation in 2+1 dimensions, with values into \mathbb{S}^2. This admits a lowest energy steady state Q, namely the stereographic projection, which extends to a two dimensional family of steady states by scaling and rotation. The authors prove that Q is unstable in the energy space \dot H^1. However, in the process of proving this they also show that within the equivariant class Q is stable in a stronger topology X \subset \dot H^1.
The 30-volume set, comprising the LNCS books 12346 until 12375, constitutes the refereed proceedings of the 16th European Conference on Computer Vision, ECCV 2020, which was planned to be held in Glasgow, UK, during August 23-28, 2020. The conference was held virtually due to the COVID-19 pandemic. The 1360 revised papers presented in these proceedings were carefully reviewed and selected from a total of 5025 submissions. The papers deal with topics such as computer vision; machine learning; deep neural networks; reinforcement learning; object recognition; image classification; image processing; object detection; semantic segmentation; human pose estimation; 3d reconstruction; stereo vision; computational photography; neural networks; image coding; image reconstruction; object recognition; motion estimation.
Affective computing refers to computing that relates to, arises from, or influences emotions, as pioneered by Rosalind Picard in 1995. The goal of affective computing is to bridge the gap between human and machines and ultimately enable robots to communicate with human naturally and emotionally. Recently, the research on affective computing has gained considerable progress with many fields contributing including neuroscience, psychology, education, medicine, behavior, sociology, and computer science. Current research in affective computing mainly focuses on estimating of human emotions through different forms of signals, e.g., face video, EEG, Speech, PET scans or fMRI. Inferring the emotion...
Studies of complexity, singularity, and anomaly using nonlocal continuum models are steadily gaining popularity. This monograph provides an introduction to basic analytical, computational, and modeling issues and to some of the latest developments in these areas. Nonlocal Modeling, Analysis, and Computation includes motivational examples of nonlocal models, basic building blocks of nonlocal vector calculus, elements of theory for well-posedness and nonlocal spaces, connections to and coupling with local models, convergence and compatibility of numerical approximations, and various applications, such as nonlocal dynamics of anomalous diffusion and nonlocal peridynamic models of elasticity and...