You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In a down-to-the earth manner, the volume lucidly presents how the fundamental concepts, methodology, and algorithms of Computational Intelligence are efficiently exploited in Software Engineering and opens up a novel and promising avenue of a comprehensive analysis and advanced design of software artifacts. It shows how the paradigm and the best practices of Computational Intelligence can be creatively explored to carry out comprehensive software requirement analysis, support design, testing, and maintenance. Software Engineering is an intensive knowledge-based endeavor of inherent human-centric nature, which profoundly relies on acquiring semiformal knowledge and then processing it to prod...
This book constitutes the refereed proceedings of the 8th Italian Conference on Theoretical Computer Science, ICTCS 2003, held in Bertinoro, Italy in October 2003. The 27 revised full papers presented together with an invited paper and abstracts of 2 invited talks were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on program design-models and analysis, algorithms and complexity, semantics and formal languages, and security and cryptography.
This book constitutes the refereed proceedings of the 7th Italian Conference on Theoretical Computer Science, ICTCS 2001, held in Torino, Italy in October 2001. The 25 revised full papers presented together with two invited papers were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on lambda calculus and types, algorithms and data structures, new computing paradigms, formal languages, objects and mobility, computational complexitiy, security, and logics and logic programming.
ICCCEG 2015, is a main annual research conference aimed at presenting current research being carried out. The idea of the conference is for the scientists, scholars, engineers and students from the Universities all around the world and the industry to present ongoing research activities, and hence to foster research relations between the Universities and the industry.
This book constitutes the refereed proceedings of the 11th International Conference on Intelligent Data Engineering and Automated Learning, IDEAL 2010, held in Paisley, Scotland, in September 2010. The 47 revised full papers presented were carefully reviewed and selected from many submissions for inclusion in the book and present the latest theoretical advances and real-world applications in computational intelligence.
This book presents selected research papers on current developments in the fields of soft computing and signal processing from the Second International Conference on Soft Computing and Signal Processing (ICSCSP 2019). The respective contributions address topics such as soft sets, rough sets, fuzzy logic, neural networks, genetic algorithms and machine learning, and discuss various aspects of these topics, e.g. technological considerations, product implementation, and application issues.
This book constitutes the refereed proceedings of the 17 International Conference on Intelligent Data Engineering and Automated Learning, IDEAL 2016, held in Yangzhou, China, in October 2016. The 68 full papers presented were carefully reviewed and selected from 115 submissions. They provide a valuable and timely sample of latest research outcomes in data engineering and automated learning ranging from methodologies, frameworks, and techniques to applications including various topics such as evolutionary algorithms; deep learning; neural networks; probabilistic modeling; particle swarm intelligence; big data analysis; applications in regression, classification, clustering, medical and biological modeling and predication; text processing and image analysis.
This book constitutes the revised selected papers of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, held in Valletta, Malta, in February 2020. The 11 full papers presented were carefully reviewed and selected from a total of 125 submissions. The papers presented in this volume address various topical research, including new approaches for attack modelling andprevention, incident management and response, and user authentication andaccess control, as well as business and human-oriented aspects such as data pro-tection and privacy, and security awareness.