You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the Third International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2006, held in federation with the Second International Conference on Natural Computation ICNC 2006. The book presents 115 revised full papers and 50 revised short papers. Coverage includes neural computation, quantum computation, evolutionary computation, DNA computation, fuzzy computation, granular computation, artificial life, innovative applications to knowledge discovery, finance, operations research, and more.
This two-volume proceedings contains revised selected papers from the International Conference on Artificial Intelligence and Computational Intelligence, AICI 2010, held in Sanya, China, in October 2010. The total of 105 high-quality papers presented were carefully reviewed and selected from 1216 submissions. The topics covered are: applications of artificial intelligence; automated problem solving; automatic programming; data mining and knowledge discovering; distributed AI and agents; expert and decision support systems; fuzzy logic and soft computing; intelligent information fusion; intelligent scheduling; intelligent signal processing; machine learning; machine vision; multi-agent systems; natural language processing; neural networks; pattern recognition; robotics; applications of computational intelligence; biomedical informatics and computation; fuzzy computation; genetic algorithms; immune computation; information security; intelligent agents and systems; nature computation; particle swarm optimization; and probabilistic reasoning.
This two-volume set (CCIS 134 and CCIS 135) constitutes the refereed proceedings of the International Conference on Intelligent Computing and Information Science, ICICIS2011, held in Chongqing, China, in January 2011. The 226 revised full papers presented in both volumes, CCIS 134 and CCIS 135, were carefully reviewed and selected from over 600 initial submissions. The papers provide the reader with a broad overview of the latest advances in the field of intelligent computing and information science.
Welcome to Zhangjiajie for the 3rd International Conference on Computer Network and Mobile Computing (ICCNMC 2005). We are currently witnessing a proliferation in mobile/wireless technologies and applications. However, these new technologies have ushered in unprecedented challenges for the research community across the range of networking, mobile computing, network security and wireless web applications, and optical network topics. ICCNMC 2005 was sponsored by the China Computer Federation, in cooperation with the Institute for Electrical and Electronics Engineers (IEEE) Computer Society. The objective of this conference was to address and capture highly innovative and stateof-the-art resear...
The International Conference on Intelligent Computing (ICIC) was formed to p- vide an annual forum dedicated to the emerging and challenging topics in artificial intelligence, machine learning, bioinformatics, and computational biology, etc. It aims to bring together researchers and practitioners from both academia and ind- try to share ideas, problems and solutions related to the multifaceted aspects of intelligent computing. ICIC 2008, held in Shanghai, China, September 15–18, 2008, constituted the 4th International Conference on Intelligent Computing. It built upon the success of ICIC 2007, ICIC 2006 and ICIC 2005 held in Qingdao, Kunming and Hefei, China, 2007, 2006 and 2005, respectiv...
The Fourth International Conference on Advanced Data Mining and Applications (ADMA 2008) will be held in Chengdu, China, followed by the last three successful ADMA conferences (2005 in Wu Han, 2006 in Xi'an, and 2007 Harbin). Our major goal of ADMA is to bring together the experts on data mining in the world, and to provide a leading international forum for the dissemination of original research results in data mining, including applications, algorithms, software and systems, and different disciplines with potential applications of data mining. This goal has been partially achieved in a very short time despite the young age of the conference, thanks to the rigorous review process insisted up...
When Song Yu saw the customer, he had sneaked out. He hadn't thought that he would run into a classmate that was deliberately making things difficult for her. A man as calm as the wind and as beautiful as the moon, this was the impression she had of him. However, she didn't know that she was never simple in his heart.
This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-Forensics 2010, held in Shanghai, China, in November 2010. The 32 revised full papers presented were carefully reviewed and selected from 42 submissions in total. These, along with 5 papers from a collocated workshop of E-Forensics Law, cover a wide range of topics including digital evidence handling, data carving, records tracing, device forensics, data tamper identification, and mobile device locating.
This book constitutes the refereed proceedings of the Second International Symposium on Intelligence Computation and Applications, ISICA 2007, held in Wuhan, China, in September 2007. The 71 revised full papers cover such topics as evolutionary computation, evolutionary learning, neural networks, swarms, pattern recognition, and data mining.
This book constitutes the refereed proceedings of the Second International Conference on Knowledge Science, Engineering and Management, KSEM 2007, held in Melbourne, Australia, in November 2007. The 42 revised full papers and 28 revised short papers presented together with five invited talks were carefully reviewed and selected. The papers provide new ideas and report research results in the broad areas of knowledge science, knowledge engineering, and knowledge management.