You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume constitutes the refereed proceedings of the 1995 Asian Computing Science Conference, ACSC 95, held in Pathumthani, Thailand in December 1995. The 29 fully revised papers presented were selected from a total of 102 submissions; clearly the majority of the participating researchers come from South-East Asian countries, but there is also a strong international component. The volume reflects research activities, particularly by Asian computer science researchers, in different areas. Special attention is paid to algorithms, knowledge representation, programming and specification languages, verification, concurrency, networking and distributed systems, and databases.
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re levant problems from both research and practice in the areas of academia, busi ness, and government. ...
Covers key rough computing research, surveying a full range of topics and examining defining issues of the field.
None
Robotics is a modern interdisciplinary field that has emerged from the marriage of computerized numerical control and remote manipulation. Today's robotic systems have intelligence features, and are able to perform dexterous and intelligent human-like actions through appropriate combination of learning, perception, planning, decision making and control. This book presents advanced concepts, techniques and applications reflecting the experience of a wide group of specialists in the field. Topics include: kinematics, dynamics, path planning and tracking, control, mobile robotics, navigation, robot programming, and sophisticated applications in the manufacturing, medical, and other areas.
The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.
This book is the proceedings of a workshop held at Heriot-Watt University in Edinburgh in August 1993. The central theme of the workshop was rules in database systems, and the papers presented covered a range of different aspects of database rule systems. These aspects are reflected in the sessions of the workshop, which are the same as the sections in this proceedings: Active Databases Architectures Incorporating Temporal Rules Rules and Transactions Analysis and Debugging of Active Rules Integrating Graphs/Objects with Deduction Integrating Deductive and Active Rules Integrity Constraints Deductive Databases The incorporation of rules into database systems is an important area of research,...
This book captures the essence of the current state of research in active media technology and identifies the new changes and opportunities ? both current and future ? in the field. Distinguished researchers such as Prof Ning Zhong from the Maebashi Institute of Technology, Prof John Yen from the Pennsylvania State University, and Prof Sanker K Pal from the Indian Statistical Institute present their research papers.
You've journeyed through the land in Book I and learned what you need to about the realm, now dive head first into the meat of this Campaign Setting with newly designed gaming elements that will help you to make your mark in the "Land of Dragons". This book includes: Races both unique and familiar. Eight races to choose from with subraces for most for a total of 28 choices to add to your arsenal of races we've already given you in the AHB, classes to delight both the power player and the new gamer alike with 9 to choose from and even a new NPC class for your CM, three new magic domains for the spellcaster inside of you with loads of new spells, as well as new skills, feats, and equipment. With this book you will have everything you need to play in the realm of Outcastia (and beyond). Even CMs will have most everything they will need...for now. So what are you waiting for? Grab some paper and pencils. Bring out that dice. Rev up your imagination and travel to a land of magic and mayhem. Your journey awaits.
This book constitutes the refereed proceedings of the 15th Algorithms and Data Structures Symposium, WADS 2017, held in St. John's, NL, Canada, in July/August 2017. The 49 full papers presented together with 3 abstracts of invited talks were carefully reviewed and selected from 109 submissions. They present original research on the theory and application of algorithms and data structures in many areas, including combinatorics, computational geometry, databases, graphics, and parallel and distributed computing. The WADS Symposium, which alternates with the Scandinavian Symposium and Workshops on Algorithm Theory, SWAT, is intended as a forum for researchers in the area of design and analysis of algorithms and data structures. Papers presenting original research on the theory and application of algorithms and data structures