Title search results
Showing 30481 - 30500 of 49178 items
Smart Societies, Infrastructure, Technologies and Applications: First International Conference, SCITA 2017, Jeddah, Saudi Arabia, November 27–29, 2017, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommuni
By Rashid Mehmood, Budhendra Bhaduri, Iyad Katib, Imrich Chlamtac. 2018
This book constitutes the refereed post-conference proceedings of the First International Conference on Smart Cities Infrastructures Technologies and…
Applications SCITA 2017 held in Jeddah Saudi Arabia in November 2017 The 35 revised full papers were carefully reviewed and selected from 62 submissions The papers are grouped in topical sections infrastructure track e-governance and transportation track healthcare track applications trackServices Computing – SCC 2018: 15th International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings (Lecture Notes in Computer Science #10969)
By George Spanoudakis, Liang, Jo o Ferreira, Yutao Ma. 2018
This book constitutes the proceedings of the International Conference on Services Computing SCC 2018 as part of SCF…
2018 held in Seattle WA USA in June 2018 The 12 papers presented in this volume were carefully reviewed and selected from numerous submissions The papers cover the science and technology of leveraging computing and information technology to model create operate and manage business servicesInternational Joint Conference SOCO’18-CISIS’18-ICEUTE’18: San Sebastián, Spain, June 6-8, 2018 Proceedings (Advances in Intelligent Systems and Computing #771)
By Manuel Gra a, lvaro Herrero, H ctor Quinti n, Emilio Corchado, Jos Manuel L pez, Oier Etxaniz, Jos S ez. 2019
This book includes papers presented at SOCO 2018 CISIS 2018 and ICEUTE 2018 all held in the beautiful…
and historic city of San Sebastian Spain in June 2018 Soft computing represents a collection or set of computational techniques in machine learning computer science and some engineering disciplines which investigate simulate and analyze highly complex issues and phenomena After a rigorous peer-review process the 13th SOCO 2018 International Program Committee selected 41 papers with a special emphasis on optimization modeling and control using soft computing techniques and soft computing applications in the field of industrial and environmental enterprises The aim of the 11th CISIS 2018 conference was to offer a meeting opportunity for academic and industry researchers from the vast areas of computational intelligence information security and data mining The need for intelligent flexible behaviour by large complex systems especially in mission-critical domains was the catalyst for the overall event Eight of the papers included in the book were selected by the CISIS 2018 International Program Committee The International Program Committee of ICEUTE 2018 selected 11 papers for inclusion in these conference proceedingsModel Checking Software: 25th International Symposium, SPIN 2018, Malaga, Spain, June 20-22, 2018, Proceedings (Lecture Notes in Computer Science #10869)
By Pedro Merino, María Del Gallardo. 2018
This book constitutes the refereed proceedings of the 25th International Symposium on Model Checking Software, SPIN 2018, held in Malaga,…
Spain, in June 2018.The 14 papers presented, 1 short paper, and 1 demo-tool paper, were carefully reviewed and selected from 28 submissions. Topics covered include formal verification techniques for automated analysis of software; formal analysis for modeling languages, such as UML/state charts; formal specification languages, temporal logic, design-by-contract; model checking, automated theorem proving, including SAT and SMT; verifying compilers; abstraction and symbolic execution techniques; and much more.This double volume set ( LNAI 10863-10864) constitutes the refereed proceedings of the 25th International Workshop, EG-ICE 2018, held in…
Lausanne, Switzerland, in June 2018. The 58 papers presented in this volume were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on Advanced Computing in Engineering, Computer Supported Construction Management, Life-Cycle Design Support, Monitoring and Control Algorithms in Engineering, and BIM and Engineering Ontologies.Multi-run Memory Tests for Pattern Sensitive Faults
By Ireneusz Mrozek. 2019
This book describes efficient techniques for production testing as well as for periodic maintenance testing specifically in terms of…
multi-cell faults in modern semiconductor memory The author discusses background selection and address reordering algorithms in multi-run transparent march testing processes Formal methods for multi-run test generation and many solutions to increase their efficiency are described in detail All methods presented ideas are verified by both analytical investigations and numerical simulations Provides the first book related exclusively to the problem of multi-cell fault detection by multi-run tests in memory testing process Presents practical algorithms for design and implementation of efficient multi-run tests Demonstrates methods verified by analytical and experimental investigationsThis book discusses processes and procedures in information data processing and management The global market is becoming more and…
more complex with an increased availability of data and information and as a result doing business with information is becoming more popular with a significant impact on modern society immensely This means that there is a growing need for a common understanding of how to create access use and manage business information As such this book explores different aspects of data and information processing including information generation representation structuring organization storage retrieval navigation human factors in information systems and the use of information It also analyzes the challenges and opportunities of doing business with information and presents various perspectives on business information managingThis book focuses on the emerging role of human factors in understanding communicating with and engaging users It…
reports on innovative approaches highlighting visuals cues such as new typographies geometries and graphics for mobile and computer interfaces The book also covers image and video processing user-focused data compression generative visuals computational photography and interactive design Further topics include creative and empathetic design human touch in digital graphics and experiential graphics Based on the AHFE 2018 International Conference on Human Factors in Communication of Design held on July 21 25 2018 in Orlando Florida USA this book reports on new findings best-practices and case studies providing readers with a fresh perspective and novel insights into the applications of human factors for enhancing the communication of design to usersComplex Networks in Software, Knowledge, and Social Systems (Intelligent Systems Reference Library #148)
By Lakhmi Jain, Milo Savi. 2019
This book provides a comprehensive review of complex networks from three different domains presents novel methods for analyzing them…
and highlights applications with accompanying case studies Special emphasis is placed on three specific kinds of complex networks of high technological and scientific importance software networks extracted from the source code of computer programs ontology networks describing semantic web ontologies and co-authorship networks reflecting collaboration in science The book is primarily intended for researchers teachers and students interested in complex networks and network data analysis However it will also be valuable for researchers dealing with software engineering ontology engineering and scientometrics as it demonstrates how complex network analysis can be used to address important research issues in these three disciplinesThis volume constitutes the proceedings of the 11th International Conference on Cloud Computing CLOUD 2018 held as part…
of the Services Conference Federation SCF 2018 in Seattle WA USA in June 2018 The 26 full papers presented together with 3 short papers were carefully reviewed and selected from 108 submissions They are organized in topical sections such as cloud computing client-server architectures distributed systems organizing principles storage virtualization virtual machines cloud based storage distributed architectures network services and computing platformsEvaluation of Novel Approaches to Software Engineering: 12th International Conference, ENASE 2017, Porto, Portugal, April 28–29, 2017, Revised Selected Papers (Communications in Computer and Information Science #866)
By Leszek Maciaszek, Ernesto Damiani, George Spanoudakis. 2018
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Evaluation of Novel Approaches to Software Engineering…
ENASE 2017 held in Porto Portugal in April 2017 The 12 full papers presented were carefully reviewed and selected from 102 submissions The mission of ENASE is to be a prime international forum to discuss and publish research findings and IT industry experiences with relation to the evaluation of novel approaches to software engineering The conference acknowledges necessary changes in systems and software thinking due to contemporary shifts of computing paradigm to e-services cloud computing mobile connectivity business processes and societal participationMachine Learning Paradigms: Advances in Data Analytics (Intelligent Systems Reference Library #149)
By Dionisios Sotiropoulos. 2019
This book explores some of the emerging scientific and technological areas in which the need for data analytics arises and…
is likely to play a significant role in the years to come At the dawn of the 4th Industrial Revolution data analytics is emerging as a force that drives towards dramatic changes in our daily lives the workplace and human relationships Synergies between physical digital biological and energy sciences and technologies brought together by non-traditional data collection and analysis drive the digital economy at all levels and offer new previously-unavailable opportunities The need for data analytics arises in most modern scientific disciplines including engineering natural- computer- and information sciences economics business commerce environment healthcare and life sciences Coming as the third volume under the general title MACHINE LEARNING PARADIGMS the book includes an editorial note Chapter 1 and an additional 12 chapters and is divided into five parts 1 Data Analytics in the Medical Biological and Signal Sciences 2 Data Analytics in Social Studies and Social Interactions 3 Data Analytics in Traffic Computer and Power Networks 4 Data Analytics for Digital Forensics and 5 Theoretical Advances and Tools for Data Analytics This research book is intended for both experts researchers in the field of data analytics and readers working in the fields of artificial and computational intelligence as well as computer science in general who wish to learn more about the field of data analytics and its applications An extensive list of bibliographic references at the end of each chapter guides readers to probe further into the application areas of interest to themCognitive Computing – ICCC 2018: Second International Conference, Held as Part of the Services Conference Federation, SCF 2018, Seattle, WA, USA, June 25-30, 2018, Proceedings (Lecture Notes in Computer Science #10971)
By Jing Xiao, Liang-Jie Zhang, Zhi-Hong Mao, Toyotaro Suzumura. 2018
This book constitutes the proceedings of the International Conference on Cognitive Computing, ICCC 2018, held as part of SCF 2018,…
in Seattle, WA, USA, in June 2018. The 15 papers presented in this volume were carefully reviewed and selected from numerous submissions. The papers cover all aspects of Sensing Intelligence (SI) as a Service (SIaaS). Cognitive Computing is a sensing-driven computing (SDC) schema that explores and integrates intelligence from all types of senses in various scenarios and solution contexts.Situational Privacy and Self-Disclosure: Communication Processes in Online Environments
By Philipp K. Masur. 2019
Using both a theoretical argumentation and an empirical investigation, this book rationalizes the view that in order to understand people’s…
privacy perceptions and behaviors, a situational perspective needs to be adopted.To this end, the book is divided into three parts. Part I advances the theory of situational privacy and self-disclosure by discussing impacts of new information and communication technologies on traditional theories of privacy and self-disclosure. Based on five basic suppositions, it describes three major processes of the theory: pre-situational privacy regulations processes, situational privacy perception and self-disclosure processes, and post-situational evaluation processes. Next, Part II presents the application of the theory to smartphone-based communication. It first analyses how people choose certain communication environments on their smartphones, how they manipulate them, and how these external factors affect self-disclosure within these environments. It then details a multi-method study conducted to test the derived assumptions and discusses the obtained results. Part III reflects on the overall implications of the theory, summarizes the major findings and lastly considers possible extensions and perspectives on future research.Intended mainly for researchers in privacy and communication studies, the book offers privacy scholars a systematic review of both classic and contemporary theories of privacy and self-disclosure. At the same time, communication scholars benefit from an additional methodological discussion of the mobile experience sampling method, which provides an invaluable approach to measuring situational communication processes.Handbook of Mathematical Geosciences: Fifty Years of IAMG
By Frits Agterberg, B.S. Daya Sagar, Qiuming Cheng. 2018
This Open Access handbook published at the IAMG's 50th anniversary, presents a compilation of invited path-breaking research contributions by award-winning…
geoscientists who have been instrumental in shaping the IAMG. It contains 45 chapters that are categorized broadly into five parts (i) theory, (ii) general applications, (iii) exploration and resource estimation, (iv) reviews, and (v) reminiscences covering related topics like mathematical geosciences, mathematical morphology, geostatistics, fractals and multifractals, spatial statistics, multipoint geostatistics, compositional data analysis, informatics, geocomputation, numerical methods, and chaos theory in the geosciences.This two-volume set LNCS 10924 and 10925 constitute the refereed proceedings of the 5th International Conference on Learning and Collaboration…
Technologies, LCT 2018, held as part of the 20th International Conference on Human-Computer Interaction, HCII 2018, in Las Vegas, NV, USA in July 2018. The 1171 papers presented at HCII 2018 conferences were carefully reviewed and selected from 4346 submissions. The papers cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of applications areas. The papers in this volume are organized in the following topical sections: designing and evaluating systems and applications, technological innovation in education, learning and collaboration, learners, engagement, motification, and skills, games and gamification of learning, technology-enhanced teaching and assessment, computing and engineering education.Software Engineering and Formal Methods: 15th International Conference, SEFM 2017, Trento, Italy, September 4–8, 2017, Proceedings (Lecture Notes in Computer Science #10469)
By Marjan Sirjani, Alessandro Cimatti. 2017
This book constitutes the refereed proceedings of the 15th International Conference on Software Engineering and Formal Methods SEFM…
2017 held in Trento Italy in September 2017 The 17 full papers and 6 short papers presented were carefully reviewed and selected from 102 submissions The papers deal with a large range of topics in the following research areas new frontiers in software architecture software verification and testing software development methods application and technology transfer security and safety an d design principlesShipwrecks and Seafaring Tales of Prince Edward Island
By Julie Watson. 2009
In the 450 years since Jacques Cartier s arrival Prince Edward Island s history has…
been tied to the sea and to ships From the first explorers through immigrants traders sailors and fishermen thousands of seafaring people and their ships have come and gone many lost to the relentless sea Julie Watson has dug through the archives and unearthed harrowing accounts from the expulsion of the Acadians to the amazing 1836 adventure of Tommy Tuplin age six who was washed overboard in a storm then washed back into the ship s rigging This book includes fascinating stories of buried treasure legends of ghost ships and tales of storms that have become part of the island s history and folklore Add to these stories of seal hunts waterspouts U-boats and ice boats and you start to share in what it means to be an islander and what the unforgiving sea can yieldSteganography Techniques for Digital Images
By Abid Yahya. 2019
This book covers newly developed and novel Steganography techniques and algorithms The book outlines techniques to provide security to…
a variety of applications using Steganography with the goal of both hindering an adversary from decoding a hidden message and also preventing an adversary from suspecting the existence of covert communications The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system called Characteristic Region-Based Image Steganography CR-BIS The algorithms combine both the robustness of the Speeded-Up Robust Features technique SURF and Discrete Wavelet Transform DWT to achieve characteristic region Steganography synchronization The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption Provides a variety of methods to achieve characteristic region Steganography synchronization Shows how Steganography improves upon cryptography by using obscurity featuresNon-Cooperative Target Tracking, Fusion and Control: Algorithms and Advances (Information Fusion and Data Science)
By Zhongliang Jing, Han Pan, Yuankai Li, Peng Dong. 2018
This book gives a concise and comprehensive overview of non-cooperative target tracking, fusion and control. Focusing on algorithms rather than…
theories for non-cooperative targets including air and space-borne targets, this work explores a number of advanced techniques, including Gaussian mixture cardinalized probability hypothesis density (CPHD) filter, optimization on manifold, construction of filter banks and tight frames, structured sparse representation, and others. Containing a variety of illustrative and computational examples, Non-cooperative Target Tracking, Fusion and Control will be useful for students as well as engineers with an interest in information fusion, aerospace applications, radar data processing and remote sensing.