This book constitutes the refereed proceedings of the 23rd International Symposium on Knowledge and Systems Sciences, KSS 2024, held in Hobart, Tasmania, Australia, during November 16-17, 2024.
This book constitutes the proceedings of the 2nd International Conference on Data Security and Privacy Protection, DSPP 2024, held in Xi'an, China, during October 25-28, 2024.
This book constitutes the proceedings of the 2nd International Conference on Data Security and Privacy Protection, DSPP 2024, held in Xi'an, China, during October 25-28, 2024.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining, and software analysis.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining, and software analysis.
This book provides basic knowledge required by an application developer to understand and use the Fully Homomorphic Encryption (FHE) technology for privacy preserving Data-Science applications.
This book provides basic knowledge required by an application developer to understand and use the Fully Homomorphic Encryption (FHE) technology for privacy preserving Data-Science applications.
This book constitutes the refereed proceedings of the 18th International Joint Conference on Theoretical Computer Science-Frontier of Algorithmic Wisdom (IJTCS-FAW 2024), consisting of the 18th International Conference on Frontier of Algorithmic Wisdom (FAW) and the 5th International Joint Conference on Theoretical Computer Science (IJTCS), held in Hong Kong, SAR, China, during July 29-31, 2024.
Complete eight data science projects that lock in important real-world skillsalong with a practical process you can use to learn any new technique quickly and efficiently.
The five-volume set CCIS 2133-2137 constitutes the refereed proceedings of the workshops held in conjunction with the Joint European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2023, which took place in Turin, Italy, during September 18-22, 2023.
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9-13, 2024.
This book highlights a collection of state-of-the-art research on Safe Artificial General Intelligence (AGI), highlighting the crucial role of cybersecurity, smart applications, and sustainable technologies in ensuring a secure AI future.
This volume constitutes the refereed proceedings of the workshops held at the 35th International Conference on Database and Expert Systems Applications, DEXA 2024, which took place in Naples, Italy, in August 2024.
This book presents Analytical and Approximate Methods for Complex Dynamical Systems and introduces ideas of discontinuous mapping treated as complex dynamical systems.
This book, for the first time, proposes the complex systems management theory based on the integration of complex systems theory and management science to solve the overall complexity problem that cannot be dealt with by the reductionism approach.
This book constitutes the refereed proceedings of the 31st International Symposium on String Processing and Information Retrieval, SPIRE 2024, held in Puerto Vallarta, Mexico, during September 23-25, 2024.
This book constitutes the refereed proceedings of the 31st International Symposium on String Processing and Information Retrieval, SPIRE 2024, held in Puerto Vallarta, Mexico, during September 23-25, 2024.
This book constitutes the refereed proceedings of the 17th International Conference on Graph Transformation, ICGT 2024, held in Enschede, The Netherlands, during July 10-11, 2024.
This book constitutes the refereed proceedings of the 17th International Conference on Graph Transformation, ICGT 2024, held in Enschede, The Netherlands, during July 10-11, 2024.
This proceedings constitutes selected papers from the Workshops KGMA, SemiBDMA, MADM, AIEDM and STBDM which were held in conjunction with APWeb-WAIM 2024 which took place in Jinhua, China, August 30-September 1, 2024.
This new second edition of the successful 2016 Atlas of Adult Autopsy Practice is fully updated and refreshed with novel illustrations, and data refinements.
This new second edition of the successful 2016 Atlas of Adult Autopsy Practice is fully updated and refreshed with novel illustrations, and data refinements.
This book constitutes the refereed post-conference proceedings of the 4th International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2024, held in Szczecin, Poland, during June 24–26, 2024.
This book constitutes the refereed post-conference proceedings of the 4th International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2024, held in Szczecin, Poland, during June 24–26, 2024.
This 2-volume set LNCS 15495-15496 constitutes the refereed proceedings of the 25th International Conference on Cryptology in India, held in Chennai, India, during December 18-21, 2024.
This 2-volume set LNCS 15495-15496 constitutes the refereed proceedings of the 25th International Conference on Cryptology in India, held in Chennai, India, during December 18-21, 2024.
This book explores the identification of influencers in complex networks, bridging theoretical approaches with practical applications across diverse fields.
This book reveals the essence of endogenous or internal contradictions in cyberspace security issues, systematically expounds the principle of cyberspace endogenous security and safety, introduces the author-invented dynamic heterogeneous redundant (DHR) architecture with endogenous security and safety features, and theoretically answers why DHR endogenous security and safety architecture can enable network resilience engineering; the enabling role of DHR architecture solves the problem that network resilience cannot cope with unknown damage, lacks structural gain, and cannot quantify design measures.
This book reveals the essence of endogenous or internal contradictions in cyberspace security issues, systematically expounds the principle of cyberspace endogenous security and safety, introduces the author-invented dynamic heterogeneous redundant (DHR) architecture with endogenous security and safety features, and theoretically answers why DHR endogenous security and safety architecture can enable network resilience engineering; the enabling role of DHR architecture solves the problem that network resilience cannot cope with unknown damage, lacks structural gain, and cannot quantify design measures.
This book constitutes the refereed proceedings of the 22nd International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2024, held in Salamanca, Spain, during June 26-28, 2024.
This book constitutes the refereed proceedings of the 22nd International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2024, held in Salamanca, Spain, during June 26-28, 2024.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining, and software analysis.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining, and software analysis.
This two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conference on Cryptology and Network Security, CANS 2024, held in Cambridge, United Kingdom during September 24-27, 2024.