Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
This book is a collection of chapters from the IFIP working groups 13.8 and 9.4. The 10 papers included present experiences and research on the topic of digital transformation and innovation practices in the global south. The topics span from digital transformation initiatives to novel innovative technological developments, practices and applications of marginalised people in the global south.
Much existing design research is either totally geometry based or totally non-geometric, and the interface between the two areas is of intense interest to industry, as well as being crucial for the successful development of integrated systems for design and manufacture.
They are organized in topical sections on machine learning, deep learning, multi-agent systems, neural computing and swarm intelligence, natural language processing, recommendation systems, social computing, business intelligence and security, pattern recognition, and image understanding.
This book constitutes the refereed proceedings of the Third International Conference on Intelligence Science, ICIS 2018, held in Beijing China, in November 2018. The 44 full papers and 5 short papers presented were carefully reviewed and selected from 85 submissions.
Environmental Informatics is a fast growing field which deals with all methods from computer science, environmental planning, ecology and related subjects. As well as being an interdisciplinary area, Environmental Informatics provides an interface between all involved professional groups.
This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics.
They are organized in topical sections on machine learning, deep learning, multi-agent systems, neural computing and swarm intelligence, natural language processing, recommendation systems, social computing, business intelligence and security, pattern recognition, and image understanding.
This book constitutes the refereed proceedings of the 13th IFIP TC 9 International Conference on Human Choice and Computers, HCC13 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 29 revised full papers presented were carefully reviewed and selected from 48 submissions.
This volume constitutes the refereed and revised post-conference proceedings of the 4th IFIP TC 5 DCITDRR International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2019, in Kyiv, Ukraine, in October 2019. The 17 full papers and 2 short papers presented were carefully reviewed and selected from 53 submissions.
This book constitutes the refereed proceedings of the 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2020, held in Costa de Caparica, Portugal, in July 2020.
This 2 volume-set of IFIP AICT 583 and 584 constitutes the refereed proceedings of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, held in Neos Marmaras, Greece, in June 2020.*The 70 full papers and 5 short papers presented were carefully reviewed and selected from 149 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections:Part I: classification; clustering - unsupervised learning -analytics; image processing; learning algorithms; neural network modeling; object tracking - object detection systems; ontologies - AI; and sentiment analysis - recommender systems. Part II: AI ethics - law; AI constraints; deep learning - LSTM; fuzzy algebra - fuzzy systems; machine learning; medical - health systems; and natural language.*The conference was held virtually due to the COVID-19 pandemic.
This 2 volume-set of IFIP AICT 583 and 584 constitutes the refereed proceedings of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, held in Neos Marmaras, Greece, in June 2020.*The 70 full papers and 5 short papers presented were carefully reviewed and selected from 149 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections:Part I: classification; clustering - unsupervised learning -analytics; image processing; learning algorithms; neural network modeling; object tracking - object detection systems; ontologies - AI; and sentiment analysis - recommender systems. Part II: AI ethics - law; AI constraints; deep learning - LSTM; fuzzy algebra - fuzzy systems; machine learning; medical - health systems; and natural language.*The conference was held virtually due to the COVID-19 pandemic.
This book constitutes the refereed proceedings of two International Workshops held as parallel events of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, in Neos Marmaras, Greece, in June 2020: the 9th Mining Humanistic Data Workshop, MHDW 2020, and the 5th Workshop on 5G-Putting Intelligence to the Network Edge, 5G-PINE 2020.* The 6 full papers and 3 short papers presented at MHDW 2020 were carefully reviewed and selected from 16 submissions; out of the 23 papers submitted to 5G-PINE 2020, 11 were accepted as full papers and 1 as a short paper. The MHDW papers focus on topics such as recommendation systems, sentiment analysis, pattern recognition, data mining, and time series. The papers presented at 5G-PINE focus on the latest AI applications in the telecommunication industry and deal with topics such as the Internet of Things, intelligence fusion in 5G networks, and 5G media.*The workshops were held virtually due to the COVID-19 pandemic.
Dear readers, Although it is well-known that confidentiality, integrity and availability are high level objectives of information security, much of the attention in the security arena has been devoted to the confidentiality and availability aspects of security.
This major reference work represents the first attempt to confront, on a world-wide basis, the way computer associations face up to their own responsibilities in an age increasingly dominated by information and communication technology. It is the first book to deal with homogenous codes namely codes of national computer societies.
We arehappy to welcome you to the IFIP Protocols for High-Speed Networks '96 workshop hosted by INRIA Sophia Antipolis. The workshop focus on problems related to the e:fficient transmission of multimedia application data using high-speed networks and internetworks.
This book contains a range of invited and submitted papers presented at the 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Karlstad, Sweden, in August 2016.The 17 revised full papers and one short paper included in this volume were carefully selected from a total of 42 submissions and were subject to a two-step review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological.The paper 'Big Data Privacy and Anonymization' is published open access under a CC BY 4.0 license at link.springer.com.
Knowledge-Intensive CAD clarifies and elaborates the concepts of knowledge-intensive design and CAD.
Security Education and Critical Infrastructures presents the most recent developments in research and practice on teaching information security, and covers topics including: -Curriculum design; -Security education program assessment; -Education in security policies, management and system certification;
Just as no man is an island, so no business can operate without being part of a network of businesses proactively collaborating and sharing information for mutual success. This book presents some of the latest thinking on collaborative systems by leading experts in the field.
Presents research worldwide on communications protocols, emphasizing specification and compliance testing. This book presents the proceedings of the fourteenth meeting on 'Protocol Specification, Testing and Verification' arranged by the International Federation for Information Processing and held in Vancouver, Canada.
This book is the combined proceedings of the latest IFIP Formal Description Techniques (FDTs) and Protocol Specification, Testing and Verification (PSTV) series. It addresses FDTs applicable to communication protocols and distributed systems, with special emphasis on standardised FDTs.
The power of modern information systems and information technology (lSIIT) offers new opportunities to rethink, at the broadest levels, existing business strategies, approaches and practices.
Presents the latest worldwide results in both the theory and practice of the testing of communicating systems.
This volume contains the latest worldwide research results on formal description techniques applicable to telecommunications, covering their theoretical foundations, industrial applications and practical usage.
The aim of this book is to present readers with state-of-the-art options which allow pupils as well as teachers to cope with the social impacts and implications of information technology and the rapid technological developments of the past 25 years.
CHARM '97 is the ninth in a series of working conferences devoted to the development and use of formal techniques in digital hardware design and verification. This series is held in collaboration with IFIP WG 10.5. Previous meetings were held in Europe every other year.
This state-of-the-art book aims to address problems and solutions in implementing complex and high quality systems past the year 2000. It will be particularly relevant to researchers in the field of software engineering and to software developers working in larger companies.
The IFIP International Working Conference on Intelligent Networks '95 was held at the Technical University of Denmark (DTU) in Copenhagen. The papers contained in this book are edited versions of the papers from the conference and some of the tutorial presentations that were arranged prior to the conference.
In fact, the manufacturing process is no more carried out by a single enterprise, rather each enterprise is just a node that adds some value (a step in the manufacturing chain) to the cooperation network of enterprises.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.