You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 20th International Conference on Innovations for Community Services, I4CS 2020, held in Bhubaneswar, India, in January, 2020. The 16 revised full papers presented in this volume were carefully reviewed and selected from 46 submissions. The papers focus on all aspects of: communities and social networks; information and system security; cloud and network security; communication and networks; and data analytics and e-governance.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Data Engineering and Management, ICDEM 2010, held in Tiruchirappalli, India, in July 2010. The 46 revised full papers presented together with 1 keynote paper and 2 tutorial papers were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on Digital Library; Knowledge and Mulsemedia; Data Management and Knowledge Extraction; Natural Language Processing; Workshop on Data Mining with Graphs and Matrices.
The International Conference on Intelligent Computing (ICIC) was formed to p- vide an annual forum dedicated to the emerging and challenging topics in artificial intelligence, machine learning, bioinformatics, and computational biology, etc. It aims to bring together researchers and practitioners from both academia and ind- try to share ideas, problems and solutions related to the multifaceted aspects of intelligent computing. ICIC 2008, held in Shanghai, China, September 15–18, 2008, constituted the 4th International Conference on Intelligent Computing. It built upon the success of ICIC 2007, ICIC 2006 and ICIC 2005 held in Qingdao, Kunming and Hefei, China, 2007, 2006 and 2005, respectiv...
This book constitutes the refereed joint proceedings of four co-located international conferences, concertedly held in Miyazaki, Japan, in June 2010. The papers in this volume were selected based on their scores obtained from the independent reviewing processes at particular conferences, and their relevance to the idea of constructing hybrid solution to address the real-world challenges of IT. It provides a chance for academic and industry professionals to catch up on recent progress in the related areas. The 49 revised full papers presented were carefully reviewed and selected during two rounds of reviewing and improvement from more than 1000 initial submissions. The papers emanate from the four following international conferences: Information Security and Assurance (ISA 2010), Advanced Communication and Networking (ACN 2010), Advanced Science and Technology (AST 2010), and Ubiquitous Computing and Multimedia Applications (UCMA 2010). This volume focuses on various aspects of advance
This book constitutes the proceedings of the 4th International Conference on Algorithms and Discrete Applied Mathematics, CALDAM 2018, held in Guwahati, India, in February 2018. The 23 papers presented in this volume were carefully reviewed and selected from 68 submissions. They focus on topics related to efficient algorithms and data structures, their analysis (both theoretical and experimental). The mathematical problems arising thereof, and new applications of discrete mathematics, advances in existing applications and development of new tools for discrete mathematics.
“Neutrosophic Sets and Systems” has been created for publications on advanced studies in neutrosophy, neutrosophic set, neutrosophic logic, neutrosophic probability, neutrosophic statistics that started in 1995 and their applications in any field, such as the neutrosophic structures developed in algebra, geometry, topology, etc. Neutrosophy is a new branch of philosophy that studies the origin, nature, and scope of neutralities, as well as their interactions with different ideational spectra. This theory considers every notion or idea together with its opposite or negation
This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information Technology, High-Performance Computing and Networking held in Haldia, India, in October 2011. The 14 full papers presented together with the abstracts of 2 invited lectures were carefully reviewed and selected from 112 sumbissions. The papers address all current aspects in cryptography, security aspects in high performance computing and in networks as well. The papers are divided in topical sections on embedded security; digital rights management; cryptographic protocols; cryptanalysis/side channel attacks; and cipher primitives.
The two-volume set of LNCS 11941 and 11942 constitutes the refereed proceedings of the 8th International Conference on Pattern Recognition and Machine Intelligence, PReMI 2019, held in Tezpur, India, in December 2019. The 131 revised full papers presented were carefully reviewed and selected from 341 submissions. They are organized in topical sections named: Pattern Recognition; Machine Learning; Deep Learning; Soft and Evolutionary Computing; Image Processing; Medical Image Processing; Bioinformatics and Biomedical Signal Processing; Information Retrieval; Remote Sensing; Signal and Video Processing; and Smart and Intelligent Sensors.
This book explores the interdisciplinary nature of machine learning in multimedia, highlighting its intersections with fields such as computer vision, natural language processing, and audio signal processing. Machine Learning in Multimedia: Unlocking the Power of Visual and Auditory Intelligence serves as a comprehensive guide to navigating this exciting terrain where artificial intelligence meets the rich tapestry of visual and auditory data. At its core, this book seeks to unravel the mysteries and unveil the potential of machine learning in the realm of multimedia. Whether it's enhancing user experiences in virtual environments, revolutionizing medical diagnostics, or shaping the future o...
This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security, ICISS 2012, held in Guwahati, India, in December 2012. The 18 revised full papers and 3 short papers presented were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on software security, acces control, covert communications, network security, and database and distributed systems security.