Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
This volume constitutes the proceedings of the 10th International Conference on Hybrid Artificial Intelligent Systems, HAIS 2015, held Bilbao, Spain, June 2014. hybrid intelligent systems for data mining and applications; classification and cluster analysis, HAIS applications.
This book constitutes the proceedings of the 9th International Workshop on Frontiers in Algorithmics, FAW 2015, held in Guilin, China, in July 2015. They deal with graph algorithms, approximation algorithms, combinatorial optimization, parameterized algorithms, and online algorithms.
This book constitutes the refereed proceedings of the 20th Ada-Europe International Conference on Reliable Software Technologies, Ada-Europe 2015, held in Madrid, Spain, in June 2015. The revised 12 full papers presented together with two keynotes were carefully reviewed and selected from 36 submissions.
The papers cover the following topics: information extraction, distributional semantics, querying and question answering systems, context-aware NLP, cognitive and semantic computing, sentiment and opinion analysis, information extraction and social media, NLP and usability, text classification and extraction, and posters and demonstrations.
This book constitutes the refereed proceedings of the 15th Conference on Artificial Intelligence in Medicine, AIME 2015, held in Pavia, Italy, in June 2015. The papers are organized in the following topical sections: process mining and phenotyping; data mining and machine learning; temporal data mining;
The mission of ADC is to share novel research solutions to problems of today's information society that fulfill the needs of heterogeneous applications and environments and to identify new issues and directions for future research.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Learning and Optimization, LION 9, which was held in Lille, France, in January 2015. The 31 contributions presented were carefully reviewed and selected for inclusion in this book.
This volume contains the lecture notes of the five coursesand one seminar given at the School on Engineering Trustworthy Software Systems(SETSS 2014), held in September 2014 at Southwest University in Chongqing,China.The material is useful for postgraduate students,researchers, academics and industrial engineers who are interested in thetheory and practice of methods and tools for the design and programming oftrustworthy software systems. The common themes of the courses include thedesign and use of theories, techniques and tools for software specification andmodeling, analysis and verification. The courses cover sequential programming,component- and object software, hybrid systems and cyber-physical systems withchallenges of termination, security, safety, security, fault-tolerance andreal-time requirements. The techniques include model checking, correctness byconstruction through refinement and model transformations, synthesis andcomputer algebra.
This volume constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Verified Software: Theories, Tools and Experiments, VSTTE 2015, held in July 2015 in San Francisco, CA, USA.The 12 revised full papers presented were carefully revised and selected from 25 submissions.The goal of this conference is to advance the state of the art in the science and technology of software verification, through the interaction of theory development, tool evolution, and experimental validation and large-scale verification efforts that involve collaboration, theory unification, tool integration, and formalized domain knowledge.
This bookconstitutes the proceedings of the 13th International Symposium on Functionaland Logic Programming, FLOPS 2016, held in Kochi, Japan, in March 2016. The 14 papers presented in this volume were carefully reviewed and selectedfrom 36 submissions. They cover the following topics: functional and logicprogramming;
This book constitutes the thoroughly refereedpost-workshop proceedings for the 26 International Workshop on combinatorialAlgorithms, IWOCA 2015, held in Verona, Italy, in October 2015. The 29 revised full papers presented were carefullyreviewed and selected from a total of 90 submissions.
Thisbook constitutes the refereed proceedings of the Cryptographer''s Track at theRSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March2016.The26 papers presented in this volume were carefully reviewed and selected from 76submissions. The focus of the track is on following subjects: secure keyexchange schemes, authenticated encryption, searchable symmetric encryption,digital signatures with new functionality, secure multi party computation, howto verify procedures, side-channel attacks on elliptic curve cryptography, hardwareattacks and security, structure-preserving signatures, lattice cryptography, cryptanalysisof symmetric key encryption, message authentication code and PRF-security, and securityof public key encryption.
This book constitutes revised selected papers from the18th Brazilian Symposium on Formal Methods, SBMF 2015, which took place in BeloHorizonte, Brazil, in September 2015. The 11 papers presented in this volume were carefullyreviewed and selected from 25 submissions. They were organized in topicalsections named: model checking;
Thisbook constitutes the thoroughly refereed post-conference proceedings of the 7thPacific Rim Symposium on Image and Video Technology, PSIVT 2015, held in Auckland,New Zealand, in November 2015.Thetotal of 61 revised papers was carefully reviewed and selected from 133submissions. The papers are organized in topical sections on color and motion,image/video coding and transmission, computational photography and arts, computervision and applications, image segmentation and classification, videosurveillance, biomedical image processing and analysis, object and patternrecognition, computer vision and pattern recognition, image/video processingand analysis, and pattern recognition.
Thisbook constitutes the refereed proceedings of the 7th International Workshop onPost-Quantum Cryptography, PQCrypto 2016, held in Fukuoka, Japan, in February2016. The 16 revised full papers presented were carefully reviewed and selectedfrom 42 submissions.
This book is the Proceedings of the 19th Annual RoboCup International Symposium, held in Hefei, China, in July 2015. The book contains 20 papers presented at the Symposium, carefully selected from 39 submissions. Additionally the book contains 11 champion team papers and one paper from the Workshop on Benchmarking Service Robots.
This book constitutes the refereed proceedings of the 15th InternationalConference on Entertainment Computing, ICEC 2016, held in Vienna, Austria, in September 2016. The 16 full papers, 13 short papers, and 2 posters presented were carefully reviewed and selected from 46 submissions.
This book constitutes revised selected papers from 7 workshops that were held in conjunction with the ISC High Performance 2016 conference in Frankfurt, Germany, in June 2016. and International Workshop on Performance Portable Programming Models for Accelerators, P3MA.
This book constitutes the refereed proceedings of the 39th Annual German Conference on Artificial Intelligence, KI 2016, in conjunction with the Österreichische Gesellschaft für Artificial Intelligence, ÖGAI, held in Klagenfurt, Austria, in September 2016.The 8 revised full technical papers presented together with 12 technical communications, and 16 extended abstracts were carefully reviewed and selected from 44 submissions.The conference provides the opportunity to present a wider range of results and ideas that are of interest to the KI audience, including reports about recent own publications, position papers, and previews of ongoing work.
This book constitutes the refereed proceedings of the 10th International Workshop on Reachability Problems, RP 2016, held in Aalborg, Denmark, in September 2016. The papers cover a range of topics in the field of reachability for infinite state systems;
This book constitutes the thoroughly refereed post-conference proceedings of the 25th Australian Conference on Computer-Human Interaction, OzCHI 2013, held in Adelaide, SA, Australia, in November 2013. The 11 revised extended papers were carefully reviewed and selected from 192 submissions and cover topics on multi-dimensional interaction;
The five-volume set LNCS 9003--9007 constitutes the thoroughly refereed post-conference proceedings of the 12th Asian Conference on Computer Vision, ACCV 2014, held in Singapore, Singapore, in November 2014. The total of 227 contributions presented in these volumes was carefully reviewed and selected from 814 submissions.
The five-volume set LNCS 9003--9007 constitutes the thoroughly refereed post-conference proceedings of the 12th Asian Conference on Computer Vision, ACCV 2014, held in Singapore, Singapore, in November 2014. low-level vision and features;
The five-volume set LNCS 9003--9007 constitutes the thoroughly refereed post-conference proceedings of the 12th Asian Conference on Computer Vision, ACCV 2014, held in Singapore, Singapore, in November 2014. The total of 227 contributions presented in these volumes was carefully reviewed and selected from 814 submissions.
The five-volume set LNCS 9003--9007 constitutes the thoroughly refereed post-conference proceedings of the 12th Asian Conference on Computer Vision, ACCV 2014, held in Singapore, Singapore, in November 2014. The total of 227 contributions presented in these volumes was carefully reviewed and selected from 814 submissions.
The five-volume set LNCS 9003--9007 constitutes the thoroughly refereed post-conference proceedings of the 12th Asian Conference on Computer Vision, ACCV 2014, held in Singapore, Singapore, in November 2014. The total of 227 contributions presented in these volumes was carefully reviewed and selected from 814 submissions.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Smart Card Research and Advanced Applications, CARDIS 2014, held in Paris, France, in November 2014. The 15 revised full papers presented in this book were carefully reviewed and selected from 56 submissions.
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014.
This book constitutes the refereed proceedings of the Cryptographer''s Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based encryption, membership, secure and efficient implementation of AES based Cryptosystems, chosen ciphertext attacks in theory and practice, algorithms for solving hard problems, constructions of hash functions and message authentication codes, secure multiparty computation, authenticated encryption, detecting and tracing malicious activities, implentation attacks on exponentiation algorithms and homomorphic encryption and its applications.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.