You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The 12th Australian Joint Conference on Artificial Intelligence (AI'QQ) held in Sydney, Australia, 6-10 December 1999, is the latest in a series of annual re gional meetings at which advances in artificial intelligence are reported. This series now attracts many international papers, and indeed the constitution of the program committee reflects this geographical diversity. Besides the usual tutorials and workshops, this year the conference included a companion sympo sium at which papers on industrial appUcations were presented. The symposium papers have been published in a separate volume edited by Eric Tsui. Ar99 is organized by the University of New South Wales, and sponsored by the Aus tr...
As modern technologies continue to transform and impact our society, Radio Frequency Identification has emerged as one of the top areas of study to do just that. Using its wireless data capturing technique and incredible capabilities such as automatic identification, tracking, handling large amounts of data, and flexibility in operation, RFID aims to revamp the new millennium. Advanced RFID Systems, Security, and Applications features a comprehensive collection of research provided by leading experts in both academia and industries. This leading reference source provides state-of-the- art development on RFID and its contents will be of the upmost use to students and researchers at all levels as well as technologists, planners, and policy makers. RFID technology is progressing into a new phase of development.
Risk detection and cyber security play a vital role in the use and success of contemporary computing. By utilizing the latest technological advances, more effective prevention techniques can be developed to protect against cyber threats. Detecting and Mitigating Robotic Cyber Security Risks is an essential reference publication for the latest research on new methodologies and applications in the areas of robotic and digital security. Featuring extensive coverage on a broad range of topics, such as authentication techniques, cloud security, and mobile robotics, this book is ideally designed for students, researchers, scientists, and engineers seeking current research on methods, models, and implementations of optimized security in digital contexts.
This book constitutes the refereed proceedings of the 6th International Symposium on Biological and Medical Data Analysis, ISBMDA 2005, held in Aveiro, Portugal, in November 2005. The 39 revised full papers presented were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on medical databases and information systems, data analysis and image processing, knowledge discovery and data mining, statistical methods and tools for biomedical data analysis, decision support systems, collaborative systems in biomedical informatics, as well as computational models, structural analysis, and microarray data analysis in the scope of bioinformatics.
The three-volume set LNCS 6675, 6676 and 6677 constitutes the refereed proceedings of the 8th International Symposium on Neural Networks, ISNN 2011, held in Guilin, China, in May/June 2011. The total of 215 papers presented in all three volumes were carefully reviewed and selected from 651 submissions. The contributions are structured in topical sections on computational neuroscience and cognitive science; neurodynamics and complex systems; stability and convergence analysis; neural network models; supervised learning and unsupervised learning; kernel methods and support vector machines; mixture models and clustering; visual perception and pattern recognition; motion, tracking and object recognition; natural scene analysis and speech recognition; neuromorphic hardware, fuzzy neural networks and robotics; multi-agent systems and adaptive dynamic programming; reinforcement learning and decision making; action and motor control; adaptive and hybrid intelligent systems; neuroinformatics and bioinformatics; information retrieval; data mining and knowledge discovery; and natural language processing.
This book constitutes the refereed proceedings of the 18th International Conference on Information Security Practice and Experience, ISPEC 2023, held in Copenhagen, Denmark, in August 2023. The 27 full papers and 8 short papers included in this volume were carefully reviewed and selected from 80 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
The three volume set LNCS 8834, LNCS 8835, and LNCS 8836 constitutes the proceedings of the 21st International Conference on Neural Information Processing, ICONIP 2014, held in Kuching, Malaysia, in November 2014. The 231 full papers presented were carefully reviewed and selected from 375 submissions. The selected papers cover major topics of theoretical research, empirical study, and applications of neural information processing research. The 3 volumes represent topical sections containing articles on cognitive science, neural networks and learning systems, theory and design, applications, kernel and statistical methods, evolutionary computation and hybrid intelligent systems, signal and image processing, and special sessions intelligent systems for supporting decision, making processes, theories and applications, cognitive robotics, and learning systems for social network and web mining.