You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The 39-volume set, comprising the LNCS books 13661 until 13699, constitutes the refereed proceedings of the 17th European Conference on Computer Vision, ECCV 2022, held in Tel Aviv, Israel, during October 23–27, 2022. The 1645 papers presented in these proceedings were carefully reviewed and selected from a total of 5804 submissions. The papers deal with topics such as computer vision; machine learning; deep neural networks; reinforcement learning; object recognition; image classification; image processing; object detection; semantic segmentation; human pose estimation; 3d reconstruction; stereo vision; computational photography; neural networks; image coding; image reconstruction; object recognition; motion estimation.
This book constitutes the refereed conference proceedings of the 9th International Conference on Multi-disciplinary Trends in Artificial Intelligence, MIWAI 2015, held in Fuzhou, China, in November 2015. The 30 revised full papers presented together with 12 short papers were carefully reviewed and selected from 83 submissions. The papers feature a wide range of topics covering knowledge representation, reasoning, and management; multi-agent systems; data mining and machine learning; computer vision; robotics; AI in bioinformatics; AI in security and networks; and other AI applications.
This book is a printed edition of the Special Issue "Plant Microbe Interaction 2017" that was published in IJMS
The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.
This book – in conjunction with the volumes LNCS 8588 and LNAI 8589 – constitutes the refereed proceedings of the 10th International Conference on Intelligent Computing, ICIC 2014, held in Taiyuan, China, in August 2014. The 58 papers of this volume were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections such as machine learning; neural networks; image processing; computational systems biology and medical informatics; biomedical informatics theory and methods; advances on bio-inspired computing; protein and gene bioinformatics: analysis, algorithms, applications.
This book – in conjunction with the volumes LNAI 8589 and LNBI 8590 – constitutes the refereed proceedings of the 10th International Conference on Intelligent Computing, ICIC 2014, held in Taiyuan, China, in August 2014. The 92 papers of this volume were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections such as evolutionary computation and learning; swarm intelligence and optimization; machine learning; social and natural computing; neural networks; biometrics recognition; image processing; information security; virtual reality and human-computer interaction; knowledge discovery and data mining; signal processing; pattern recognition; biometric system and security for intelligent computing.
This book – in conjunction with the volumes LNCS 8588 and LNBI 8590 – constitutes the refereed proceedings of the 10th International Conference on Intelligent Computing, ICIC 2014, held in Taiyuan, China, in August 2014. The 85 papers of this volume were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections such as soft computing; artificial bee colony algorithms; unsupervised learning; kernel methods and supporting vector machines; machine learning; fuzzy theory and algorithms; image processing; intelligent computing in computer vision; intelligent computing in communication networks; intelligent image/document retrievals; intelligent da...
Legend has it that he is the King of Lou, the man who kills without batting an eye. According to legend, he was the ruler of the entire Easton Continent. Legend has it that he was once cursed with a bloodthirsty curse by his own hands. Legend has it that he gets sick every full moon night. Legend had it that he needed the blood of a virgin to suppress the curse. After passing through, she was actually trapped in the gloomy and cold underground palace, being crazily bitten by the devilish monster! She screamed out in pain, but the tears on her face did not gain the slightest bit of sympathy from him. She tried to escape several times, but all she got in return was the sound of his curses resounding in her ears, "Lonely pet, you're destined to be a lonely woman in this life. Never think of escaping."
his two-volume set LNCS 12689-12690 constitutes the refereed proceedings of the 12th International Conference on Advances in Swarm Intelligence, ICSI 2021, held in Qingdao, China, in July 2021. The 104 full papers presented in this volume were carefully reviewed and selected from 177 submissions. They cover topics such as: Swarm Intelligence and Nature-Inspired Computing; Swarm-based Computing Algorithms for Optimization; Particle Swarm Optimization; Ant Colony Optimization; Differential Evolution; Genetic Algorithm and Evolutionary Computation; Fireworks Algorithms; Brain Storm Optimization Algorithm; Bacterial Foraging Optimization Algorithm; DNA Computing Methods; Multi-Objective Optimization; Swarm Robotics and Multi-Agent System; UAV Cooperation and Control; Machine Learning; Data Mining; and Other Applications.