You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The International Conference on Intelligent Computing (ICIC) was formed to p- vide an annual forum dedicated to the emerging and challenging topics in artificial intelligence, machine learning, bioinformatics, and computational biology, etc. It aims to bring together researchers and practitioners from both academia and ind- try to share ideas, problems and solutions related to the multifaceted aspects of intelligent computing. ICIC 2008, held in Shanghai, China, September 15–18, 2008, constituted the 4th International Conference on Intelligent Computing. It built upon the success of ICIC 2007, ICIC 2006 and ICIC 2005 held in Qingdao, Kunming and Hefei, China, 2007, 2006 and 2005, respectiv...
This volume includes most of the recent results obtained by Italian researchers in fuzzy logic. It collects selected papers from the 1997 Italian Workshop on Fuzzy Logic — WILF '97 and some invited papers, covering the mathematical foundations of fuzzy logic, neuro-fuzzy systems, hardware implementation of fuzzy logic controllers, and gives an update on applications to control, physics, decision support systems and pattern analysis.
This book constitutes the thoroughly refereed proceedings of the 6th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, IC3K 2014, held in Rome, Italy, in October 2014. The 37 full papers presented were carefully reviewed and selected from 287 submissions. The papers are organized in topical sections on knowledge discovery and information retrieval; knowledge engineering and ontology development; knowledge management and information sharing.
Business organizations and governments are nowadays developing and providing internet based electronic services (e-services) featuring various intelligent functions. This book offers a thorough introduction and systematic overview of the new field e-service intelligence. It covers the state-of-the-art of e-service intelligence including both theorems and applications, and a broad range of topics are discussed.
A collection of papers presented at the PSAM 7 – ESREL ’04 conference in June 2004, reflecting a wide variety of disciplines, such as principles and theory of reliability and risk analysis, systems modelling and simulation, consequence assessment, human and organisational factors, structural reliability methods, software reliability and safety, insights and lessons from risk studies and management/decision making. This volume covers both well-established practices and open issues in these fields, identifying areas where maturity has been reached and those where more development is needed.
Computational Modelling of Objects Represented in Images: Fundamentals, Methods and Applications III contains all contributions presented at the International Symposium CompIMAGE 2012 - Computational Modelling of Object Presented in Images: Fundamentals, Methods and Applications (Rome, Italy, 5-7 September 2012). The contributions cover the state-o
This book aims to bring together selected recent advances, applications and original results in the area of biometric face recognition. They can be useful for researchers, engineers, graduate and postgraduate students, experts in this area and hopefully also for people interested generally in computer science, security, machine learning and artificial intelligence. Various methods, approaches and algorithms for recognition of human faces are used by authors of the chapters of this book, e.g. PCA, LDA, artificial neural networks, wavelets, curvelets, kernel methods, Gabor filters, active appearance models, 2D and 3D representations, optical correlation, hidden Markov models and others. Also a broad range of problems is covered: feature extraction and dimensionality reduction (chapters 1-4), 2D face recognition from the point of view of full system proposal (chapters 5-10), illumination and pose problems (chapters 11-13), eye movement (chapter 14), 3D face recognition (chapters 15-19) and hardware issues (chapters 19-20).
The TCGOV 2005 international conference on e-government was held at the Free University of Bozen-Bolzano during March 2–4, 2005. The conference was initiated by the working group “Towards Electronic Democracy” (TED) of the European Science Foundation and was jointly organized by the Free University ofBozen-Bolzano,theMunicipalityofBozen-Bolzano,theTEDWorkingGroup, and the IFIP Working Group 8.5. The conference addressed a large spectrum of issues that are relevant and have to be investigated for a successful transition from the traditional form of government to a new form known as e-government. The main focus was on the following topics: – improving citizen participation and policy m...
This book constitutes the thoroughly refereed post-workshop proceedings of the Second International Workshop on Privacy, Security, and Trust in KDD, PinKDD 2008, held in Las Vegas, NV, USA, in March 2008 in conjunction with the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008. The 5 revised full papers presented together with 1 invited keynote lecture and 2 invited panel sessions were carefully reviewed and selected from numerous submissions. The papers are extended versions of the workshop presentations and incorporate reviewers' comments and discussions at the workshop and represent the diversity of data mining research issues in privacy, security, and trust as well as current work on privacy issues in geographic data mining.
The two volumes LNCS 5863 and 5864 constitute the proceedings of the 16th International Conference on Neural Information Processing, ICONIP 2009, held in Bangkok, Thailand, in December 2009. The 145 regular session papers and 53 special session papers presented were carefully reviewed and selected from 466 submissions. The papers are structured in topical sections on cognitive science and computational neuroscience, neurodynamics, mathematical modeling and analysis, kernel and related methods, learning algorithms, pattern analysis, face analysis and processing, image processing, financial applications, computer vision, control and robotics, evolutionary computation, other emerging computational methods, signal, data and text processing, artificial spiking neural systems: nonlinear dynamics and engineering applications, towards brain-inspired systems, computational advances in bioinformatics, data mining for cybersecurity, evolutionary neural networks: theory and practice, hybrid and adaptive systems for computer vision and robot control, intelligent data mining, neural networks for data mining, and SOM and related subjects and its applications.