This practically-oriented textbook presents an accessible introduction to discrete mathematics through a substantial collection of classroom-tested exercises.
This monograph gives a thorough treatment of the celebrated compositions of signature and encryption that allow for verifiability, that is, to efficiently prove properties about the encrypted data.
This book develops a new approach called parameter advising for finding a parameter setting for a sequence aligner that yields a quality alignment of a given set of input sequences.
This book constitutes the refereed proceedings of the 29th Australasian Joint Conference on Artificial Intelligence, AI 2016, held in Hobart, TAS, Australia, in December 2016.
This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Big Data Benchmarking, WBDB 2015, held in Toronto, ON, Canada, in June 2015 and the 7th International Workshop, WBDB 2015, held in New Delhi, India, in December 2015.
This book describes the computational challenges posed by the progression toward nanoscale electronic devices and increasingly short design cycles in the microelectronics industry, and proposes methods of model reduction which facilitate circuit and device simulation for specific tasks in the design cycle.
This book develops a new approach called parameter advising for finding a parameter setting for a sequence aligner that yields a quality alignment of a given set of input sequences.
This monograph presents the Timed Input/Output Automaton (TIOA) modeling framework, a basic mathematical framework to support description and analysis of timed (computing) systems.
Entity Resolution (ER) lies at the core of data integration and cleaning and, thus, a bulk of the research examines ways for improving its effectiveness and time efficiency.
Since the introduction of Bitcoin-the first widespread application driven by blockchain-the interest of the public and private sectors in blockchain has skyrocketed.
The topic of using views to answer queries has been popular for a few decades now, as it cuts across domains such as query optimization, information integration, data warehousing, website design and, recently, database-as-a-service and data placement in cloud systems.
Schema matching is the task of providing correspondences between concepts describing the meaning of data in various heterogeneous, distributed data sources.
One of the application areas of data mining is the World Wide Web (WWW or Web), which serves as a huge, widely distributed, global information service for every kind of information such as news, advertisements, consumer information, financial management, education, government, e-commerce, health services, and many other information services.
This lecture covers several core issues in user-centered data management, including how to design usable interfaces that suitably support database tasks, and relevant approaches to visual querying, information visualization, and visual data mining.
This book focuses on how the BOXES Methodology, which is based on the work of Donald Michie, is applied to ill-defined real-time control systems with minimal a priori knowledge of the system.
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018.
This two-volume set LNICST 254-255 constitutes the post-conference proceedings of the 14thInternational Conference on Security and Privacy in Communication Networks, SecureComm 2018, held in Singapore in August 2018.
This book constitutes the refereed proceedings of the 19th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2018, held in Poitiers, France, in September 2018.
This book constitutes the refereed proceedings of the 12th International Conference on Provable Security, ProvSec 2018, held in Jeju, South Korea, in October 2018.
This three-volume set LNCS 11139-11141 constitutes the refereed proceedings of the 27th International Conference on Artificial Neural Networks, ICANN 2018, held in Rhodes, Greece, in October 2018.
This three-volume set LNCS 11139-11141 constitutes the refereed proceedings of the 27th International Conference on Artificial Neural Networks, ICANN 2018, held in Rhodes, Greece, in October 2018.
This three-volume set LNCS 11139-11141 constitutes the refereed proceedings of the 27th International Conference on Artificial Neural Networks, ICANN 2018, held in Rhodes, Greece, in October 2018.
This book constitutes the refereed post-conference proceedings of the 25th International Colloquium on Structural Information and Communication Complexity, SIROCCO 2018, held in Ma'ale HaHamisha, Israel, in June 2018.
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018.
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018.
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of the 4th International Conference on Cloud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018.
Updated and revised second edition of the bestselling guide to exploring and mastering the most important algorithms for solving complex machine learning problemsKey FeaturesUpdated to include new algorithms and techniquesCode updated to Python 3.
Revised and expanded to include multi-agent methods, discrete optimization, RL in robotics, advanced exploration techniques, and moreKey FeaturesSecond edition of the bestselling introduction to deep reinforcement learning, expanded with six new chaptersLearn advanced exploration techniques including noisy networks, pseudo-count, and network distillation methodsApply RL methods to cheap hardware robotics platformsBook DescriptionDeep Reinforcement Learning Hands-On, Second Edition is an updated and expanded version of the bestselling guide to the very latest reinforcement learning (RL) tools and techniques.
Use your programming skills to create and optimize high-frequency trading systems in no time with Java, C++, and PythonKey FeaturesLearn how to build high-frequency trading systems with ultra-low latencyUnderstand the critical components of a trading systemOptimize your systems with high-level programming techniquesBook DescriptionThe world of trading markets is complex, but it can be made easier with technology.
With the flexibility and features of scikit-learn and Python, build machine learning algorithms that optimize the programming process and take application performance to a whole new levelKey FeaturesExplore scikit-learn uniform API and its application into any type of modelUnderstand the difference between supervised and unsupervised modelsLearn the usage of machine learning through real-world examplesBook DescriptionAs machine learning algorithms become popular, new tools that optimize these algorithms are also developed.
Get the most out of JavaScript for building web applications through a series of patterns, techniques, and case studies for clean codingKey FeaturesWrite maintainable JS code using internal abstraction, well-written tests, and well-documented codeUnderstand the agents of clean coding like SOLID principles, OOP, and functional programmingExplore solutions to tackle common JavaScript challenges in building UIs, managing APIs, and writing statesBook DescriptionBuilding robust apps starts with creating clean code.