This LNCS conference 3-volume set constitutes the proceedings of the 17th International Conference on Social Networks Analysis and Mining, ASONAM 2025, in Niagara Falls, ON, Canada, during August 25–28, 2025.
This LNCS conference 3-volume set constitutes the proceedings of the 17th International Conference on Social Networks Analysis and Mining, ASONAM 2025, in Niagara Falls, ON, Canada, during August 25–28, 2025.
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as performance optimization in IoT, big data, reliability, privacy, security, service selection, QoS and machine learning.
This two-volume set LNCS 16169–16170 constitutes the refereed proceedings of the 23rd International Conference on Image Analysis and Processing, ICIAP 2025 Workshops, held in Rome, Italy, during September 15–19, 2025.
This two-volume set LNCS 16169–16170 constitutes the refereed proceedings of the 23rd International Conference on Image Analysis and Processing, ICIAP 2025 Workshops, held in Rome, Italy, during September 15–19, 2025.
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as performance optimization in IoT, big data, reliability, privacy, security, service selection, QoS and machine learning.
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic web, social networks, and multi-agent systems.
This, the 29th issue of the Transactions on Computational Science journal, is comprised of seven full papers focusing on the area of secure communication.
This book constitutes the proceedings of the 27th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2026, which took place in Rennes, France, during January 12-13, 2026.
This book constitutes the proceedings of the 27th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2026, which took place in Rennes, France, during January 12-13, 2026.
This 18-volume set constitutes the refereed proceedings of the 8th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2025, held in Shanghai, China, during October 15-18, 2025.
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic web, social networks, and multi-agent systems.
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic web, social networks, and multi-agent systems.
This, the 29th issue of the Transactions on Computational Science journal, is comprised of seven full papers focusing on the area of secure communication.
The LNCS journal Transactions on Rough Sets is devoted to the entire spectrum of rough sets related issues, from logical and mathematical foundations, through all aspects of rough set theory and its applications, such as data mining, knowledge discovery, and intelligent information processing, to relations between rough sets and other approaches to uncertainty, vagueness, and incompleteness, such as fuzzy sets and theory of evidence.
This journal subline serves as a forum for stimulating and disseminating innovative research ideas, theories, emerging technologies, empirical investigations, state-of-the-art methods, and tools in all different genres of edutainment, such as game-based learning and serious games, interactive storytelling, virtual learning environments, VR-based education, and related fields.
The paper is organized as follows: In section 2, we describe the no- orientation-discontinuity interfering model based on a Gaussian stochastic model in analyzing the properties of the interfering strokes.
In this monograph, Joachim Baumann provides in-depth coverage of essential research issues; namely, mechanisms for locating and terminating mobile agents and for orphan detection in a mobile agent system.
This book presents 5 tutorial lectures by leading researchers given at the ICTAC 2013 Software Engineering School on Unifying Theories of Programming and Formal Engineering Methods, held in Shanghai, China in August 2013.
This book describes recent multidisciplinary research at the confluence of the fields of logic programming, database theory and human-computer interaction.
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks and multiagent systems.
The topic of this book is the following optimisation problem: given a set of discrete variables and a set of functions, each depending on a subset of the variables, minimise the sum of the functions over all variables.
The LNCS Journal on Data Semantics is devoted to the presentation of notable work that, in one way or another, addresses research and development on issues related to data semantics.
This book constitutes the documentation of the scientific outcome of the first meeting of the TIMELY network, the International Workshop on Multidisciplinary Aspects of Time and Time Perception, which took place in Athens, Greece, in October 2010.
This Festschrift volume, published in honor of Michael Gelfond on the occasion of his 65th birthday, contains a collection of papers written by his closest friends and colleagues.
This book presents the state of the art in the areas of ontology evolution and knowledge-driven multimedia information extraction, placing an emphasis on how the two can be combined to bridge the semantic gap.
Recent advances in the fields of knowledge representation, reasoning and human-computer interaction have paved the way for a novel approach to treating and handling context.
Data management has evolved over the years from being strictly associated with database systems, through active databases, to become a topic that has grown beyond the scope of a single field encompassing a large range of subjects, such as distributed systems, event-driven systems, and peer-to-peer and streaming systems.
Reinforcement learning has developed as a successful learning approach for domains that are not fully understood and that are too complex to be described in closed form.