Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Computational Intelligence and Security
  • Language: en
  • Pages: 1205

Computational Intelligence and Security

  • Type: Book
  • -
  • Published: 2006-06-18
  • -
  • Publisher: Springer

The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.

Information Security and Cryptology
  • Language: en
  • Pages: 560

Information Security and Cryptology

This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019. The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.

Neural Information Processing
  • Language: en
  • Pages: 660

Neural Information Processing

The three-volume set of LNCS 12532, 12533, and 12534 constitutes the proceedings of the 27th International Conference on Neural Information Processing, ICONIP 2020, held in Bangkok, Thailand, in November 2020. Due to COVID-19 pandemic the conference was held virtually. The 187 full papers presented were carefully reviewed and selected from 618 submissions. The papers address the emerging topics of theoretical research, empirical studies, and applications of neural information processing techniques across different domains. The third volume, LNCS 12534, is organized in topical sections on biomedical information; neural data analysis; neural network models; recommender systems; time series analysis.

Information Security and Cryptology
  • Language: en
  • Pages: 495

Information Security and Cryptology

This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11–13, 2022. The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.

Neural Information Processing
  • Language: en
  • Pages: 590

Neural Information Processing

  • Type: Book
  • -
  • Published: 2018-12-03
  • -
  • Publisher: Springer

The seven-volume set of LNCS 11301-11307 constitutes the proceedings of the 25th International Conference on Neural Information Processing, ICONIP 2018, held in Siem Reap, Cambodia, in December 2018. The 401 full papers presented were carefully reviewed and selected from 575 submissions. The papers address the emerging topics of theoretical research, empirical studies, and applications of neural information processing techniques across different domains. The 5th volume, LNCS 11305, is organized in topical sections on prediction; pattern recognition; and word, text and document processing.

Computational and Experimental Simulations in Engineering
  • Language: en
  • Pages: 1435

Computational and Experimental Simulations in Engineering

This book gathers the latest advances, innovations, and applications in the field of computational engineering, as presented by leading international researchers and engineers at the 29th International Conference on Computational & Experimental Engineering and Sciences (ICCES), held in Shenzhen, China on May 26-29, 2023. ICCES covers all aspects of applied sciences and engineering: theoretical, analytical, computational, and experimental studies and solutions of problems in the physical, chemical, biological, mechanical, electrical, and mathematical sciences. As such, the book discusses highly diverse topics, including composites; bioengineering & biomechanics; geotechnical engineering; offshore & arctic engineering; multi-scale & multi-physics fluid engineering; structural integrity & longevity; materials design & simulation; and computer modeling methods in engineering. The contributions, which were selected by means of a rigorous international peer-review process, highlight numerous exciting ideas that will spur novel research directions and foster multidisciplinary collaborations.

IDEE 2023
  • Language: en
  • Pages: 876

IDEE 2023

This book contains the proceedings of the International Conference on Industrial Design and Environmental Engineering (IDEE 2023) held via the hybrid form in Zhengzhou, China from November 24th to 26th, 2023. The specific topics covered in this conference include innovative design, multimedia applied art design, environmental analysis and monitoring, pollution control programs, hydrology and water resources engineering, urban and regional planning, global climate change and international carbon emission reduction cooperation. The conference aims to bring together various professionals from the scientific community to foster connections between science, technology, and industry, and provide a...

Computer Security – ESORICS 2022
  • Language: en
  • Pages: 754

Computer Security – ESORICS 2022

The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode. The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.

Skylines and Other Dominance-Based Queries
  • Language: en
  • Pages: 151

Skylines and Other Dominance-Based Queries

This book is a gentle introduction to dominance-based query processing techniques and their applications. The book aims to present fundamental as well as some advanced issues in the area in a precise, but easy-to-follow, manner. Dominance is an intuitive concept that can be used in many different ways in diverse application domains. The concept of dominance is based on the values of the attributes of each object. An object dominates another object if is better than . This goodness criterion may differ from one user to another. However, all decisions boil down to the minimization or maximization of attribute values. In this book, we will explore algorithms and applications related to dominance-based query processing. The concept of dominance has a long history in finance and multi-criteria optimization. However, the introduction of the concept to the database community in 2001 inspired many researchers to contribute to the area. Therefore, many algorithmic techniques have been proposed for the efficient processing of dominance-based queries, such as skyline queries, -dominant queries, and top- dominating queries, just to name a few.

Cloud Computing and Security
  • Language: en
  • Pages: 766

Cloud Computing and Security

  • Type: Book
  • -
  • Published: 2018-09-25
  • -
  • Publisher: Springer

This six volume set LNCS 11063 – 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control, artificial intelligence, automation systems, computing systems, electrical and informative systems. The six volumes are arranged according to the subject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics