This book constitutes the refereed proceedings of the 28th International Conference on Data Analytics and Management in Data Intensive Domains, DAMDID/RCDL 2016, held in Ershovo, Moscow, Russia, in October 2016.
This book constitutes the proceedings of the 19th International Workshop on Security and Trust Management, STM 2023, co-located with the 28th European Symposium on Research in Computer Security, ESORICS 2023, held in The Hague, The Netherlands, during September 28th, 2023 The 5 full papers together with 4 short papers included in this volume were carefully reviewed and selected from 15 submissions.
The two-volume set CCIS 662 and CCIS 663 constitutes the refereed proceedings of the 7th Chinese Conference on Pattern Recognition, CCPR 2016, held in Chengdu, China, in November 2016.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on New Frontiers in Mining Complex Patterns, NFMCP 2015, held in conjunction with ECML-PKDD 2015 in Porto, Portugal, in September 2015.
This book presents high-quality original contributions on the development of automatic traffic analysis systems that are able to not only anticipate traffic scenarios, but also understand the behavior of road users (vehicles, bikes, trucks, etc.
This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2014, held in Tainan, Taiwan, in May 2014 in conjunction with PAKDD 2014, the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining.
New technologies mean that sports clubs and governing bodies are generating more data than ever to help manage their relationship with fans, their performance, and their income streams.
This bookconstitutes revised selected papers from the third ECML PKDD Workshop on DataAnalytics for Renewable Energy Integration, DARE 2015, held in Porto, Portugal,in September 2015.
This book covers aspects of data science and predictive analytics used in the oil and gas industry by looking into the challenges of data processing and data modelling unique to this industry.
Although the terms "e;data mining"e; and "e;knowledge discovery and data mining"e; (KDDM) are sometimes used interchangeably, data mining is actually just one step in the KDDM process.
This double volumes LNCS 10573-10574 constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2017, Ontologies, Databases, and Applications of Semantics, ODBASE 2017, and Cloud and Trusted Computing, C&TC, held as part of OTM 2017 in October 2017 in Rhodes, Greece.
Get up to speed on Apache Accumulo, the flexible, high-performance key/value store created by the National Security Agency (NSA) and based on Googles BigTable data storage system.
The eleven-volume set LNCS 15286-15295 constitutes the refereed proceedings of the 31st International Conference on Neural Information Processing, ICONIP 2024, held in Auckland, New Zealand, in December 2024.
Summary Humans learn best from feedbackwe are encouraged to take actions that lead to positive results while deterred by decisions with negative consequences.
This book constitutes the refereed post-conference proceedings of the First International Workshop on Spectral and Shape Analysis in Medical Imaging, SeSAMI 2016, held in conjunction with MICCAI 2016, in Athens, Greece, in October 2016.
Biometrics in a Data Driven World: Trends, Technologies, and Challenges aims to inform readers about the modern applications of biometrics in the context of a data-driven society, to familiarize them with the rich history of biometrics, and to provide them with a glimpse into the future of biometrics.
This book provides information on data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart cities.
Explore Kinesis managed services such as Kinesis Data Streams, Kinesis Data Analytics, Kinesis Data Firehose, and Kinesis Video Streams with the help of practical use casesKey FeaturesGet well versed with the capabilities of Amazon KinesisExplore the monitoring, scaling, security, and deployment patterns of various Amazon Kinesis servicesLearn how other Amazon Web Services and third-party applications such as Splunk can be used as destinations for Kinesis dataBook DescriptionAmazon Kinesis is a collection of secure, serverless, durable, and highly available purpose-built data streaming services.
As modern society is extremely dependent on the Internet, social networks, and developing technologies, a threat to the security of both the individual and society as a whole has emerged.
This book presents the proceedings of the 6th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA-2017), held in Bhubaneswar, Odisha.
This book constitutes extended, revised and selected papers from the 6th International Conference on Cloud Computing and Services Science, CLOSER 2016, held in Rome, Italy, in April 2016.
This book constitutes the refereed proceedings of the Third International Conference on Soft Computing and its Engineering Applications, icSoftComp 2021, held in Changa, India, in December 2021.
This book constitutes the thoroughlyrefereed proceedings of the Fourth InternationalSymposium on Data-Driven Process Discovery and Analysis held in Riva del Milan,Italy, in November 2014.
This book presents new approaches that advance research in all aspects of agent-based models, technologies, simulations and implementations for data intensive applications.
This book facilitates both the theoretical background and applications of fuzzy, intuitionistic fuzzy and rough, fuzzy rough sets in the area of data science.
This book constitutes the refereed proceedings of the 12th International Conference entitled Beyond Databases, Architectures and Structures, BDAS 2016, held in Ustron, Poland, in May/June 2016.
This two-volume set of LNCS 12489 and 12490 constitutes the thoroughly refereed conference proceedings of the 21th International Conference on Intelligent Data Engineering and Automated Learning, IDEAL 2020, held in Guimaraes, Portugal, in November 2020.
This book constitutes the proceedings of the Third Joint International Semantic Technology Conference, JIST 2013, held in Seoul, South Korea, in November 2013.
This book constitutes the refereed proceedings of the 17th Annual Conference on Towards Autonomous Robotics, TAROS 2016, held in Sheffield UK, in June/July 2016.
The book includes high-quality research papers presented at the International Conference on Innovative Computing and Communication (ICICC 2018), which was held at the Guru Nanak Institute of Management (GNIM), Delhi, India on 5-6 May 2018.
This book constitutes the refereed joint proceedings of the First International Workshop on Graphs in Biomedical Image Analysis, GRAIL 2017, the 6th International Workshop on Mathematical Foundations of Computational Anatomy, MFCA 2017, and the Third International Workshop on Imaging Genetics, MICGen 2017, held in conjunction with the 20th International Conference on Medical Imaging and Computer-Assisted Intervention, MICCAI 2017, in Quebec City, QC, Canada, in September 2017.
This is the first study of Boko Haram that brings advanced data-driven, machine learning models to both learn models capable of predicting a wide range of attacks carried out by Boko Haram, as well as develop data-driven policies to shape Boko Haram's behavior and reduce attacks by them.
This volume provides a comprehensive introduction to mHealth technology and is accessible to technology-oriented researchers and practitioners with backgrounds in computer science, engineering, statistics, and applied mathematics.