This book constitutes the refereed proceedings of the 14th China Conference on Wireless Sensor Networks, CWSN 2020 held in Dunhuang, China, in September 2020.
Reversible grammar allows computational models to be built that are equally well suited for the analysis and generation of natural language utterances.
A One-Stop Source of Known Results, a Bibliography of Papers on the Subject, and Novel Research Directions Focusing on a very active area of research in the last decade, Combinatorics of Compositions and Words provides an introduction to the methods used in the combinatorics of pattern avoidance and pattern enumeration in compositions and words.
This book constitutes the refereed proceedings of the 17th European Conference on Evolutionary Computation in Combinatorial Optimization, EvoCOP 2017, held in Amsterdam, The Netherlands, in April 2017, co-located with the Evo*2017 events EuroGP, EvoMUSART and EvoApplications.
Terrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications.
This book provides a systematic introduction to the fundamental concepts, major challenges, and effective solutions for Quality of Service in Wireless Sensor Networks (WSNs).
This 16th International Conference on Information Technology - New Generations (ITNG), continues an annual event focusing on state of the art technologies pertaining to digital information and communications.
This book examines the recent trend of extending data dependencies to adapt to rich data types in order to address variety and veracity issues in big data.
This book constitutes the refereed proceedings of the 14th Annual Conference on Theory and Applications of Models of Computation, TAMC 2017, held in Bern, Switzerland, in April 2017.
The two-volume set of LNCS 10385 and 10386, constitutes the proceedings of the 8th International Confrence on Advances in Swarm Intelligence, ICSI 2017, held in Fukuoka, Japan, in July/August 2017.
This book constitutes the proceedings of the 19th International Conference on Mathematical Optimization Theory and Operations Research, MOTOR 2020, held in Novosibirsk, Russia, in July 2020.
This book constitutes the refereed proceedings of the 14th International Scandinavian Symposium and Workshops on Algorithm Theory, SWAT 2014, held in Copenhagen, Denmark, in July 2014.
This book constitutes the refereed proceedings of the 30th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2023, held in Alcala de Henares, Spain, during June 6-9, 2023.
This book constitutes the proceedings of the 5th International Conference on Algorithms and Discrete Applied Mathematics, CALDAM 2019, held in Kharagpur, India, in February 2019.
This book constitutes the refereed proceedings of the 18th International Joint Conference on Theoretical Computer Science-Frontier of Algorithmic Wisdom (IJTCS-FAW 2024), consisting of the 18th International Conference on Frontier of Algorithmic Wisdom (FAW) and the 5th International Joint Conference on Theoretical Computer Science (IJTCS), held in Hong Kong, SAR, China, during July 29-31, 2024.
As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external threats.
Algorithmen, oh Gott, könnte man in Anlehnung an einen populärwissenschaftlichen Teubner-Titel denken, denn selbst unter den Mathematikern kann man häufiger auf ein etwas zweifelhaftes Verhältnis zum Algorithmus treffen: Die einen halten ihn für einen mehr historischen und damit angestaubten Begriff.
Finding Data Anomalies You Didn't Know to Look ForAnomaly detection is the detective work of machine learning: finding the unusual, catching the fraud, discovering strange activity in large and complex datasets.
This book constitutes the proceedings of the 11th International Conference on Cellular Automata for Research and Industry, ACRI 2014, held in Krakow, Poland, in September 2014.
This book constitutes the thoroughly refereedpost-conference proceedings of the 6th International Conference on MathematicalAspects of Computer and Information Sciences, MACIS 2015, held in Berlin,Germany, in November 2015.
This fourvolume set LNCS 9528, 9529, 9530 and 9531 constitutes the refereed proceedingsof the 15th International Conference on Algorithms and Architectures for ParallelProcessing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015.
This book constitutes the refereed proceedings of the 8th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2018, held in Kanpur, India, in December 2018.
The four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024.
Many emerging technologies such as video conferencing, video-on-demand, and digital libraries require the efficient delivery of compressed video streams.
This book constitutes the thoroughly refereed proceedings of the National Conference of Theoretical Computer Science, NCTCS 2017, held in Wuhan, Hubei, China, in October 2017.
Edited by professionals with years of experience, this book provides an introduction to the theory of evolutionary algorithms and single- and multi-objective optimization, and then goes on to discuss to explore applications of evolutionary algorithms for many uses with real-world applications.
The four-volume set LNCS 11334-11337 constitutes the proceedings of the 18th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2018, held in Guangzhou, China, in November 2018.
This book constitutesselected, revised and extended papers of the 14th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE 2019, held in Heraklion, Crete, Greece, in May 2019.
This book lays out the theoretical groundwork for personalized search and reputation management, both on the Web and in peer-to-peer and social networks.
This book constitutes the refereed post-conference proceedings of the Second International Conference on Cyber Security and Computer Science, ICONCS 2020, held in Dhaka, Bangladesh, in February 2020.
Artificial intelligence (AI) is increasingly impacting many aspects of people's lives across the globe, from relatively mundane technology to more advanced digital systems that can make their own decisions.
This book gathers a collection of selected works and new research results of scholars and graduate students presented at International Conference on Evolutionary Artificial Intelligence (ICEAI 2023) held in Malaysia during 13-14 September 2023.
This book presents the study to design, develop, and implement improved PI control techniques using dead-time compensation, structure enhancements, learning functions and fractional ordering parameters.
The five-volume set LNCS 9155-9159 constitutes the refereed proceedings of the 15th International Conference on Computational Science and Its Applications, ICCSA 2015, held in Banff, AB, Canada, in June 2015.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Computers and Games, CG 2013, held in Yokohama, Japan, in August 2013, in conjunction with the 17th Computer and Games Tournament and the 20th World Computer-Chess Championship.
Semantic Models for Multimedia Database Searching and Browsing begins with the introduction of multimedia information applications, the need for the development of the multimedia database management systems (MDBMSs), and the important issues and challenges of multimedia systems.
The topic of using views to answer queries has been popular for a few decades now, as it cuts across domains such as query optimization, information integration, data warehousing, website design and, recently, database-as-a-service and data placement in cloud systems.