You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Computational intelligence is a general term for a class of algorithms designed by nature's wisdom and human intelligence. Computer scientists have proposed many computational intelligence algorithms with heuristic features. These algorithms either mimic the evolutionary processes of the biological world, mimic the physiological structure and bodily functions of the organism, imitate the behavior of the animal's group, mimic the characteristics of human thought, language, and memory processes, or mimic the physical phenomena of nature, hoping to simulate the wisdom of nature and humanity enables an optimal solution to the problem and solves an acceptable solution in an acceptable time. Computational intelligent algorithms have received extensive attention at home and abroad, and have become an important research direction of artificial intelligence and computer science. This book will introduce the application of intelligent optimization algorithms in detail from the aspects of computational intelligence, job shop scheduling problems, multi-objective optimization problems, and machine learning
This book constitutes the refereed proceedings of the First International Workshop on Process-Aware Systems, PAS 2014, held in Shanghai, China, in October 2014. The 5 revised full papers and 3 short papers were carefully reviewed and selected from 14 submissions. The papers are organized in topical sections on process modeling and comparison; workflow scheduling and resource allocation; scientific workflow verification; workflow applications.
The volume LNCS 7529 constitutes the refereed proceedings of the International Conference on Web Information Systems and Mining, WISM 2012, held in Chengdu, China, in October 2012. The 87 revised full papers presented were carefully reviewed and selected from 418 submissions. The papers are organized in topical sections on applications of Web information systems; applications of Web mining; e-government and e-commerce; information security; intelligent networked systems; management information systems; mobile computing; semantic Web and ontologies; Web information extraction; Web intelligence; Web interfaces and applications; and XML and semi-structured data.
A guide to the challenges in making virtual reality, reality The Metaverse, a version of the internet in which online interactions take place in real time within fully realized virtual spaces, has been promised as the next frontier in wireless communication. It has drawn huge investment from Silicon Valley and widespread media attention. However, the technologies required to make the Metaverse a reality are still in their infancy, and significant barriers must be overcome if this massive step is to be taken. Realizing the Metaverse provides a systematic overview of these challenges and their likely solutions. Focusing on five key areas—infrastructure, access, intelligence, security, and fu...
This book constitutes the proceedings of the 10th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP. The 47 papers were carefully selected from 157 submissions and focus on topics for researchers and industry practioners to exchange information regarding advancements in the state of art and practice of IT-driven services and applications, as well as to identify emerging research topics and define the future directions of parallel processing.
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017. The 45 revised full papers, 2 keynotes, 8 invited papers and 10 short papers presented in this double volume, were carefully revised and selected from 150 submissions. The papers of Part I (LNCS 10342) are organized in topical sections on public key encryption; attribute-based encryption; identity-based encryption; searchable encryption; cryptanalysis; digital signatures. The papers of Part II (LNCS 10343) are organized in topical sections on symmetric cryptography; software security; network security; malware detection; privacy; authentication; elliptic curve cryptography.
The 2010 International Conference on Web Information Systems and Mining (WISM 2010) was held October 23–24, 2010 in Sanya, China. WISM 2010 received 603 submissions from 20 countries and regions. After rigorous reviews, 54 hi- quality papers were selected for publication in the WISM 2010 proceedings. The acceptance rate was 9%. The aim of WISM 2010 was to bring together researchers working in many different areas of Web information systems and Web mining to foster the exchange of new ideas and promote international collaboration. In addition to the large number of submitted papers and invited sessions, there were several internationally well-known keynote speakers. On behalf of the Organiz...
This book contains the best papers of the Third International Conference on Software and Data Technologies (ICSOFT 2008), held in Porto, Portugal, which was organized by the Institute for Systems and Technologies of Information, Communication and Control (INSTICC), co-sponsored by the Workflow Management Coalition (WfMC), in cooperation with the Interdisciplinary Institute for Collaboration and Research on Enterprise Systems and Technology (IICREST). The purpose of ICSOFT 2008 was to bring together researchers, engineers and practitioners interested in information technology and software development. The conference tracks were “Software Engineering”, “Information Systems and Data Manag...
This book constitutes the proceedings of the Second International Conference on Cloud, Networking for IoT Systems, CN4IoT 2017, and the Second EAI International Conference on ICT Infrastructures and Services for Smart Cities, IISSC 2017, held in Brindisi, Italy, in April 2017. The 26 full papers of both conferences were selected from 39 submissions. CN4IoT presents research activities on the uniform management and operation related to software defined infrastructures, in particular by analyzing limits or advantages in solutions for Cloud Networking and IoT. IISSC papers focus on ICT infrastructures (technologies, models, frameworks) and services in cities and smart communities.