This book constitutes the refereed proceedings of the 14th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2022, held Ho Chi Minh City, Vietnam in November 2022.
This book constitutes the proceedings of the 19th International Conference on Web Information Systems and Applications, WISA 2022, held in Dalian, China, in September 2022.
This book constitutes the refereed proceedings of the 18th International Conference on Web and Internet Economics, WINE 2022, which was held Troy, NY, USA in December 2022.
This book is a collection of selected research papers presented at the 2024 5th International Conference on Artificial Intelligence in Education Technology (AIET 2024), held in Barcelona, Spain, on July 29 - 31, 2024.
Apply Data Fabric solutions to automate Data Integration, Data Sharing, and Data Protection across disparate data sources using different data management styles.
The volume LNAI 12228 constitute the refereed proceedings of the 21th Annual Conference "e;Towards Autonomous Robotics,"e; TAROS 20120, held in Nottingham, UK, in September 2020.
This book constitutes the refereed proceedings of the 18th International Conference on Modeling Decisions for Artificial Intelligence, MDAI 2021, held in Umea, Sweden, in September 2021.
This book constitutes thoroughly reviewed, revised and selected papers from the 4th International Conference on Human Centered Computing, HCC 2018, held in Merida, Mexico, in December 2018.
This book constitutes the refereed post-conference proceedings of the 8th International Conference on Big Data Technologies and Applications, BDTA 2017, held in Gwangju, South Korea, in November 2017.
This book constitutes the refereed post-conference proceedings of the 6th Russian Supercomputing Days, RuSCDays 2020, held in Moscow, Russia, in September 2020.
This two-volume set LNAI 12163 and 12164 constitutes the refereed proceedings of the 21th International Conference on Artificial Intelligence in Education, AIED 2020, held in Ifrane, Morocco, in July 2020.
This book constitutes the refereed proceedings of the 26th International Conference on Applications of Natural Language to Information Systems, NLDB 2021, held online in July 2021.
The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021.
This book constitutes the proceedings of the Third International Workshop on Explainable, Transparent AI and Multi-Agent Systems, EXTRAAMAS 2021, which was held virtually due to the COVID-19 pandemic.
This volume constitutes the refereed proceedings of the 8th Workshop on Engineering Applications, WEA 2021, held in Medellin, Colombia, in October 2021.
This book constitutes the refereed proceedings of the tracks and workshops which complemented the 14th European Conference on Software Architecture, ECSA 2020, held in L'Aquila, Italy*, in September 2020.
This two-volume set LNCS 12198 and 12199 constitutes the thoroughly refereed proceedings of the 11th International Conference on Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management, DHM 2020, which was supposed to be held as part of the 22st HCI International Conference, HCII 2020, in Copenhagen, Denmark, in July 2020.
This two-volume set LNCS 12035 and 12036 constitutes the refereed proceedings of the 42nd European Conference on IR Research, ECIR 2020, held in Lisbon, Portugal, in April 2020.
Representation learning in heterogeneous graphs (HG) is intended to provide a meaningful vector representation for each node so as to facilitate downstream applications such as link prediction, personalized recommendation, node classification, etc.
This book constitutes revised papers from the International Workshops held at the 20th International Conference on Business Process Management, BPM 2022, in Munster, Germany, during September 11-15, 2022.
This book constitutes the refereed proceedings of the 8th International Symposium, UNet 2022, held in Montreal, QC, Canada, during October 25-27, 2022.
This book constitutes the post proceedings of the 18th International Workshop on Security and Trust Management, STM 2022, co-located with the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in Copenhagen, Denmark, in September 2022.
This book constitutes the refereed workshop proceedings of the 11th International Workshop on Structured Object-Oriented Formal Language and Method, SOFL+MSVL 2022, held in Madrid, in October 2022.
This book facilitates both the theoretical background and applications of fuzzy, intuitionistic fuzzy and rough, fuzzy rough sets in the area of data science.
This textbook integrates important mathematical foundations, efficient computational algorithms, applied statistical inference techniques, and cutting-edge machine learning approaches to address a wide range of crucial biomedical informatics, health analytics applications, and decision science challenges.
Explainable Deep Learning AI: Methods and Challenges presents the latest works of leading researchers in the XAI area, offering an overview of the XAI area, along with several novel technical methods and applications that address explainability challenges for deep learning AI systems.
This book introduces the concept of "e;bespoke learning"e;, a new mechanistic approach that makes it possible to generate values of an output variable at each designated value of an associated input variable.
The multi-volume set LNAI 13713 until 13718 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2022, which took place in Grenoble, France, in September 2022.
The multi-volume set LNAI 13713 until 13718 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2022, which took place in Grenoble, France, in September 2022.
This book discusses the application of data systems and data-driven infrastructure in existing industrial systems in order to optimize workflow, utilize hidden potential, and make existing systems free from vulnerabilities.