You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the throughly refereed post-proceedings of the 4th International Conference on Intelligent Data Engineering and Automated Learning, IDEAL 2003, held in Hong Kong, China in March 2003. The 164 revised papers presented were carefully reviewed and selected from 321 submissions; for inclusion in this post-proceedings another round of revision was imposed. The papers are organized in topical sections an agents, automated learning, bioinformatics, data mining, multimedia information, and financial engineering.
The focus of the Asian Applied Computing Conference (AACC) is primarily to bring the research in computer science closer to practical applications. The conference is aimed primarily at topics that have immediate practical bene?ts. By hosting the conf- ence in the developingnations in Asia we aim to provide a forum for engagingboth the academic and the commercial sectors in that region. The ?rst conference “Information Technology Prospects and Challenges” was held in May 2003 in Kathmandu, Nepal. Thisyear theconferencenamewas changedto “Asian AppliedComputingConference” to re?ect both the regional- and the application-oriented nature of the conference. AACC is planned to be a themed c...
The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.
This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008. The 55 revised full papers presented were carefully reviewed and selected from the presentations at the workshops. The 21 papers of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) cover topics such as information retrieval and event detection, internet security and cybercrime, currency and data protection, cryptography, image and video analysis, privacy issues, social networks, modeling and visualization, and network intrusion detection. The Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) furnishes 10 papers about forensic information management, forensic technologies, and forensic principles and tools. The 24 papers of the Workshop on Social Computing (SOCO 2008) are organized in topical sections on social web and social information management, social networks and agent-based modeling, as well as social opinions, e-commerce, security and privacy considerations.
This book constitutes the refereed proceedings of the International Workshop on Intelligence and Security Informatics, WISI 2006, held in Singapore in conjunction with the 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 32 papers presented together with the abstract of the keynote talk were carefully reviewed. The papers are organized in sections on Web and text mining for terrorism informatics, cybercrime analysis, network security, and crime data mining.
Wavelet analysis and its applications have been one of the fastest-growing research areas in the past several years. Wavelet theory has been employed in numerous fields and applications, such as signal and image processing, communication systems, biomedical imaging, radar, and air acoustics. Active media technology is concerned with the development of autonomous computational or physical entities capable of perceiving, reasoning, adapting, learning, cooperating, and delegating in a dynamic environment.This book captures the essence of the state of the art in wavelet analysis and its applications and active media technology. At the Congress, invited talks were delivered by distinguished researchers, namely Prof John Daugman of Cambridge University, UK; Prof Bruno Torresani of INRIA, France; Prof Victor Wickerhauser of Washington University, USA, Prof Ning Zhong of the Maebashi Institute of Technology, Japan; Prof John Yen of Pennsylvania State University, USA; and Prof Sankar K Pal of the Indian Statistical Institute, India.
This volume contains the papers selected for presentation at The 2009 Inter- tional Conference on Brain Informatics (BI 2009) held at Beijing University of Technology, China, on October 22–24, 2009. It was organized by the Web Int- ligence Consortium (WIC) and IEEE Computational Intelligence Society Task Force on Brain Informatics (IEEE TF-BI). The conference was held jointly with The 2009 International Conference on Active Media Technology (AMT 2009). Brain informatics (BI) has emergedas an interdisciplinaryresearch?eld that focuses on studying the mechanisms underlying the human information proce- ing system (HIPS). It investigates the essential functions of the brain, ranging from perce...
This book constitutes the thoroughly refereed post-proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2006, held in Guangzhou, China in November 2006. The 116 revised papers presented were carefully reviewed and selected from a total of 2078 initial submissions during two rounds of revision and improvement. The papers are organized in topical sections on bio-inspired computing, evolutionary computation, learning systems and multi-agents, cryptography, information processing and intrusion detection, systems and security, image and signal processing, as well as pattern recognition.
Seeking to capture the essence of the current state of research in active media technology, this volume identifies the changes and opportunities - both current and future - in the field. The papers are taken from the Second International Conference on Active Media Technology, held in China in 2003. Researchers such as Professor Ning Zhong from the Maebashi Institute of Technology, Professor John Yen from the Pennsylvania State University, and Professor Sanker K. Pal from the Indian Statistical Institute present their research papers.
This book constitutes the refereed proceedings of the 6th International Conference on Independent Component Analysis and Blind Source Separation, ICA 2006, held in Charleston, SC, USA, in March 2006. The 120 revised papers presented were carefully reviewed and selected from 183 submissions. The papers are organized in topical sections on algorithms and architectures, applications, medical applications, speech and signal processing, theory, and visual and sensory processing.