You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The intended readership includes both undergraduate and graduate students majoring in computer science as well as researchers in the computer science area. The book is suitable either as a textbook or as a supplementary book in algorithm courses. Over 400 computational problems are covered with various algorithms to tackle them. Rather than providing students simply with the best known algorithm for a problem, this book presents various algorithms for readers to master various algorithm design paradigms. Beginners in computer science can train their algorithm design skills via trivial algorithms on elementary problem examples. Graduate students can test their abilities to apply the algorithm...
This solution manual is to accompany the book entitled “7 Algorithm Design Paradigms.” It is strongly recommended that students attempt the exercises without this solution manual, in order to improve their knowledge and skills.
"This book reviews issues and trends in security and privacy at an individual user level, as well as within global enterprises, covering enforcement of existing security technologies, factors driving their use, and goals for ensuring the continued security of information systems"--Provided by publisher.
This book constitutes the refereed proceedings of the 2nd International Conference on Model and Data Engineering, MEDI 2012, held in Poitiers, France, in October 2012. The 12 revised full papers presented together with 5 short papers were carefully reviewed and selected from 35 submissions. The papers are cover the topics of model driven engineering, ontology engineering, formal modeling, security, and data mining.
These are the proceedings of the International Conference on ISMAC-CVB, held in Palladam, India, in May 2018. The book focuses on research to design new analysis paradigms and computational solutions for quantification of information provided by object recognition, scene understanding of computer vision and different algorithms like convolutional neural networks to allow computers to recognize and detect objects in images with unprecedented accuracy and to even understand the relationships between them. The proceedings treat the convergence of ISMAC in Computational Vision and Bioengineering technology and includes ideas and techniques like 3D sensing, human visual perception, scene understanding, human motion detection and analysis, visualization and graphical data presentation and a very wide range of sensor modalities in terms of surveillance, wearable applications, home automation etc. ISMAC-CVB is a forum for leading academic scientists, researchers and research scholars to exchange and share their experiences and research results about all aspects of computational vision and bioengineering.
None
Thisvolumecontainspapersselectedforpresentationatthe6thIAPRWorkshop on Document Analysis Systems (DAS 2004) held during September 8–10, 2004 at the University of Florence, Italy. Several papers represent the state of the art in a broad range of “traditional” topics such as layout analysis, applications to graphics recognition, and handwritten documents. Other contributions address the description of complete working systems, which is one of the strengths of this workshop. Some papers extend the application domains to other media, like the processing of Internet documents. The peculiarity of this 6th workshop was the large number of papers related to digital libraries and to the process...
This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that arise at the interface between deep learning and cybersecurity. This book also provides insight into the difficult "how" and "why" questions that arise in AI within the security domain. For example, this book includes chapters covering "explainable AI", "adversarial learning", "resilient AI", and a wide variety of related topics. It’s not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Researchers and advanced level students working and studying in the fields of cybersecurity (equivalently, information security) or artificial intelligence (including deep learning, machine learning, big data, and related fields) will want to purchase this book as a reference. Practitioners working within these fields will also be interested in purchasing this book.
This book constitutes the refereed proceedings of the 6th International Conference on Collective Intelligence, ICCCI 2014, held in Seoul, Korea, in September 2014. The 70 full papers presented were carefully reviewed and selected from 205 submissions. They address topics such as knowledge integration, data mining for collective processing, fuzzy, modal and collective systems, nature inspired systems, language processing systems, social networks and semantic web, agent and multi-agent systems, classification and clustering methods, multi-dimensional data processing, Web systems, intelligent decision making, methods for scheduling, image and video processing, collective intelligence in web systems, computational swarm intelligence, cooperation and collective knowledge.
A comprehensive overview into digital literary studies that equips readers to navigate the difficult contentions in this space. The Literary Agenda is a series of short polemical monographs about the importance of literature and of reading in the wider world and about the state of literary education inside schools and universities. The category of 'the literary' has always been contentious. What is clear, however, is how increasingly it is dismissed or is unrecognised as a way of thinking or an arena for thought. It is sceptically challenged from within, for example, by the sometimes rival claims of cultural history, contextualized explanation, or media studies. It is shaken from without by ...