You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume constitutes the refereed proceedings of the 1995 Asian Computing Science Conference, ACSC 95, held in Pathumthani, Thailand in December 1995. The 29 fully revised papers presented were selected from a total of 102 submissions; clearly the majority of the participating researchers come from South-East Asian countries, but there is also a strong international component. The volume reflects research activities, particularly by Asian computer science researchers, in different areas. Special attention is paid to algorithms, knowledge representation, programming and specification languages, verification, concurrency, networking and distributed systems, and databases.
This volume contains the proceedings of the IFIPTM 2008, the Joint iTrust and PST Conferences on Privacy, Trust Management and Security, held in Trondheim, Norway from June 18 to June 20, 2008. IFIPTM 2008 provides a truly global platform for the reporting of research, development, policy and practice in the interdependent areas of Privacy, Security, and Trust. Following the traditions inherited from the highly successful iTrust and PST conference series, IFIPTM 2008 focuses on trust, privacy and security from multidisciplinary perspectives. The conference is an arena for discussion about re levant problems from both research and practice in the areas of academia, busi ness, and government. ...
This volume contains papers presented at the BCS-FACS Workshop on Specification and Verification of Concurrent Systems held on 6-8 July 1988, at the University of Stirling, Scotland. Specification and verification techniques are playing an increasingly important role in the design and production of practical concurrent systems. The wider application of these techniques serves to identify difficult problems that require new approaches to their solution and further developments in specification and verification. The Workshop aimed to capture this interplay by providing a forum for the exchange of the experience of academic and industrial experts in the field. Presentations included: surveys, o...
The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.
Robotics is a modern interdisciplinary field that has emerged from the marriage of computerized numerical control and remote manipulation. Today's robotic systems have intelligence features, and are able to perform dexterous and intelligent human-like actions through appropriate combination of learning, perception, planning, decision making and control. This book presents advanced concepts, techniques and applications reflecting the experience of a wide group of specialists in the field. Topics include: kinematics, dynamics, path planning and tracking, control, mobile robotics, navigation, robot programming, and sophisticated applications in the manufacturing, medical, and other areas.
This book constitutes the refereed proceedings of the 10th International Conference on Algebraic Methodology and Software Technology, AMAST 2004, held in Stirling, Scotland, UK in July 2004. The 35 revised full papers presented together with abstracts of 5 invited talks and an invited paper were carefully reviewed and selected from 63 submissions. Among the topics covered are all current issues in formal methods related to algebraic approaches to software engineering including abstract data types, process algebras, algebraic specification, model checking, abstraction, refinement, model checking, state machines, rewriting, Kleene algebra, programming logic, etc.
AMAST’s goal is to advance awareness of algebraic and logical methodology as part of the fundamental basis of software technology. Ten years and seven conferences after the start of the AMAST movement, I believe we are attaining this. The movement has propagated throughout the world, assembling many enthusiastic specialists who have participated not only in the conferences, which are now annual, but also in the innumerable other activities that AMAST promotes and supports. We are now facing the Seventh International Conference on Algebraic Methodology and Software Technology (AMAST’98). The previous meetings were held in Iowa City, USA (1989 and 1991), in Enschede, The Netherlands (1993)...
You've journeyed through the land in Book I and learned what you need to about the realm, now dive head first into the meat of this Campaign Setting with newly designed gaming elements that will help you to make your mark in the "Land of Dragons". This book includes: Races both unique and familiar. Eight races to choose from with subraces for most for a total of 28 choices to add to your arsenal of races we've already given you in the AHB, classes to delight both the power player and the new gamer alike with 9 to choose from and even a new NPC class for your CM, three new magic domains for the spellcaster inside of you with loads of new spells, as well as new skills, feats, and equipment. With this book you will have everything you need to play in the realm of Outcastia (and beyond). Even CMs will have most everything they will need...for now. So what are you waiting for? Grab some paper and pencils. Bring out that dice. Rev up your imagination and travel to a land of magic and mayhem. Your journey awaits.
This book is devoted to the development of adequate spatial representations for robot motion planning. Drawing upon advanced heuristic techniques from AI and computational geometry, the authors introduce a general model for spatial representation of physical objects. This model is then applied to two key problems in intelligent robotics: collision detection and motion planning. In addition, the application to actual robot arms is kept always in mind, instead of dealing with simplified models. This monograph is built upon Angel del Pobil's PhD thesis which was selected as the winner of the 1992 Award of the Spanish Royal Academy of Doctors.
This book constitutes the refereed proceedings of the 4th International Conference on Deductive and Object-Oriented Databases, DOOD '95, held in Singapore in December 1995. Besides two keynote papers by Stefano Ceri and Michael Kifer, the book contains revised full versions of 28 papers selected from a total of 88 submissions. The volume gives a highly competent state-of-the-art report on DOOD research and advanced applications. The papers are organized in sections on active databases, query processing, semantic query optimization, transaction management, authorization, implementation, and applications.