You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume emphasizes the applications and implications of the Geospatial Web and the role of contextual knowledge in shaping the emerging network society. There is a clear focus on applied geospatial aspects. The book has contributions from a very active research community. Containing chapters from renowned researchers and practitioners, this volume will be invaluable to all interested in this field.
Evolutionary Multi-Objective Optimization is an expanding field of research. This book brings a collection of papers with some of the most recent advances in this field. The topic and content is currently very fashionable and has immense potential for practical applications and includes contributions from leading researchers in the field. Assembled in a compelling and well-organised fashion, Evolutionary Computation Based Multi-Criteria Optimization will prove beneficial for both academic and industrial scientists and engineers engaged in research and development and application of evolutionary algorithm based MCO. Packed with must-find information, this book is the first to comprehensively and clearly address the issue of evolutionary computation based MCO, and is an essential read for any researcher or practitioner of the technique.
The growth in the amount of data collected and generated has exploded in recent times with the widespread automation of various day-to-day activities, advances in high-level scienti?c and engineering research and the development of e?cient data collection tools. This has given rise to the need for automa- callyanalyzingthedatainordertoextractknowledgefromit,therebymaking the data potentially more useful. Knowledge discovery and data mining (KDD) is the process of identifying valid, novel, potentially useful and ultimately understandable patterns from massive data repositories. It is a multi-disciplinary topic, drawing from s- eral ?elds including expert systems, machine learning, intelligent...
This book presents the most recent concerns and research results in industrial fault diagnosis using intelligent techniques. It focuses on computational intelligence applications to fault diagnosis with real-world applications used in different chapters to validate the different diagnosis methods. The book includes one chapter dealing with a novel coherent fault diagnosis distributed methodology for complex systems.
This book presents the state-of-the-art in successfully engineered self-organizing systems. It goes further, too, to examine ways to balance design and self-organization in the context of applications. As demonstrated throughout, finding this balance helps to deal with diverse practical challenges. The case studies described illustrate the richness of the topic and provide guidance on its more intricate areas.
What we profoundly witness these days is a growing number of human-centric systems and a genuine interest in a comprehensive understanding of their underlying paradigms and the development of solid and efficient design practices. We are indeed in the midst of the next information revolution, which very likely brings us into a completely new world of ubiquitous and invisible computing, Ambient Intelligent (AMI), and wearable hardware. This requires a totally new way of thinking in which cognitive aspects of design, cognitive system engineering and distributed approach play a pivotal role. This book fully addresses these timely needs by filling a gap between the two well-established discipline...
Space support in databases poses new challenges in every part of a database management system & the capability of spatial support in the physical layer is considered very important. This has led to the design of spatial access methods to enable the effective & efficient management of spatial objects. R-trees have a simplicity of structure & together with their resemblance to the B-tree, allow developers to incorporate them easily into existing database management systems for the support of spatial query processing. This book provides an extensive survey of the R-tree evolution, studying the applicability of the structure & its variations to efficient query processing, accurate proposed cost models, & implementation issues like concurrency control and parallelism. Written for database researchers, designers & programmers as well as graduate students, this comprehensive monograph will be a welcome addition to the field.
"Machine Learning and Data Mining for Computer Security" provides an overview of the current state of research in machine learning and data mining as it applies to problems in computer security. This book has a strong focus on information processing and combines and extends results from computer security. The first part of the book surveys the data sources, the learning and mining methods, evaluation methodologies, and past work relevant for computer security. The second part of the book consists of articles written by the top researchers working in this area. These articles deals with topics of host-based intrusion detection through the analysis of audit trails, of command sequences and of system calls as well as network intrusion detection through the analysis of TCP packets and the detection of malicious executables. This book fills the great need for a book that collects and frames work on developing and applying methods from machine learning and data mining to problems in computer security.
This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008. The 55 revised full papers presented were carefully reviewed and selected from the presentations at the workshops. The 21 papers of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) cover topics such as information retrieval and event detection, internet security and cybercrime, currency and data protection, cryptography, image and video analysis, privacy issues, social networks, modeling and visualization, and network intrusion detection. The Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) furnishes 10 papers about forensic information management, forensic technologies, and forensic principles and tools. The 24 papers of the Workshop on Social Computing (SOCO 2008) are organized in topical sections on social web and social information management, social networks and agent-based modeling, as well as social opinions, e-commerce, security and privacy considerations.
This book provides state-of-the-art e-learning networked environments and architectures carried out over the last few years from a knowledge management perspective. It contains a comprehensive discussion of e-learning concepts, models, experiments and best practices. Presenting a wide-ranging survey of methods and applications from contributors from around the world, this book will be a valuable resource for researchers, practitioners and graduates.