Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
This book constitutes the refereed proceedings of the 12th Information Retrieval Societies Conference, AIRS 2016, held in Beijing, China, in November/December 2016. The 21 full papers presented together with 11 short papers were carefully reviewed and selected from 57 submissions.
This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2016, held in Aksaray, Turkey, in September 2016.The 9 full papers presented were carefully reviewed and selected from 18 submissions.
This book constitutes the workshop proceedings of the 22nd International Conference on Database Systems for Advanced Applications, DASFAA 2017, held in Suzhou, China, in March 2017.
This two volume set LNCS 10177 and 10178 constitutes the refereed proceedings of the 22nd International Conference on Database Systems for Advanced Applications, DASFAA 2017, held in Suzhou, China, in March 2017. graph and network data processing;
ΓÇïThis book constitutes the refereed proceedings of the 20th European Conference on Genetic Programming, EuroGP 2017, held in Amsterdam, The Netherlands, in April 2017, co-located with the Evo* 2017 events, EvoCOP, EvoMUSART, and EvoApplications.The 14 revised full papers presented together with 8 poster papers were carefully reviewed and selected from 32 submissions. The wide range of topics in this volume reflects the current state of research in the field. Thus, we see topics and applications including program synthesis, genetic improvement, grammatical representations, self-adaptation, multi-objective optimisation, program semantics, search landscapes, mathematical programming, games, operations research, networks, evolvable hardware, and program synthesis benchmarks.
This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017.
This book constitutes the thoroughly refereed post-workshop proceedings of the International Workshop on Brain Lesion, as well as the challenges on Brain Tumor Segmentation (BRATS), Ischemic Stroke Lesion Image Segmentation (ISLES), and the Mild Traumatic Brain Injury Outcome Prediction (mTOP), held in Athens, October 17, 2016, in conjunction with the International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2016. The 26 papers presented in this volume were carefully reviewed. They present the latest advances in segmentation, disease prognosis and other applications to the clinical context.
This book constitutes the refereed proceedings of the 17th European Conference on Evolutionary Computation in Combinatorial Optimization, EvoCOP 2017, held in Amsterdam, The Netherlands, in April 2017, co-located with the Evo*2017 events EuroGP, EvoMUSART and EvoApplications.The 16 revised full papers presented were carefully reviewed and selected from 39 submissions. The papers cover both empirical and theoretical studies on a wide range of academic and real-world applications. The methods include evolutionary and memetic algorithms, large neighborhood search, estimation of distribution algorithms, beam search, ant colony optimization, hyper-heuristics and matheuristics. Applications include both traditional domains, such as knapsack problem, vehicle routing, scheduling problems and SAT; and newer domains such as the traveling thief problem, location planning for car-sharing systems and spacecraft trajectory optimization. Papers also study important concepts such as pseudo-backbones, phase transitions in local optima networks, and the analysis of operators. This wide range of topics makes the EvoCOP proceedings an important source for current research trends in combinatorial optimization.
This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on the Arithmetic of Finite Field, WAIFI 2016, held in Ghent, Belgium, in July 2016. The 14 revised full papers and 3 invited talks presented were carefully reviewed and selected from 38 submissions. cryptography and Boolean functions.
This book constitutes the refereed proceedings of the 12th International Conference on Persuasive Technology, PERSUASIVE 2017, held in Amsterdam, The Netherlands, in April 2017. The 23 revised full papers presented were carefully reviewed and selected from 85 submissions.
This book constitutes the refereed proceedings of the 4th International Workshop and Challenge on Computational Methods and Clinical Applications for Spine Imaging, CSI 2016, held in conjunction with MICCAI 2016, in Athens, Greece, in October 2016. The 13 workshop papers were carefully reviewed and selected for inclusion in this volume. They aim at reviewing the state-of-the-art techniques, sharing the novel and emerging analysis and visualization techniques and discussing the clinical challenges and open problems in this rapidly growing field - including all major aspects of problems related to spine imaging, including clinical applications of spine imaging, computer aided diagnosis of spine conditions, computer aided detection of spine-related diseases, emerging computational imaging techniques for spinal diseases, fast 3D reconstruction of spine, feature extraction, multiscale analysis, pattern recognition, image enhancement of spine imaging, image-guided spine intervention and treatment, multimodal image registration and fusion for spine imaging, novel visualization techniques, segmentation techniques for spine imaging, statistical and geometric modeling for spine and vertebra, spine and vertebra localization.
This book constitutes the refereed proceedings of two workshops held at the International Conference on Health ΓÇô Exploring Complexity and Medical Informatics Europe, HEC 2016, held in Munich, Germany, in September 2016: the 8th International Workshop on Knowledge Representation for Health Care, KR4HC 2016, and the 9th International Workshop on Process-oriented Information Systems in Healthcare, ProHealth 2016.The 8 revised full papers were carefully reviewed and selected from 12 submissions. The papers are organized in topical sections on ontologies in health care; clinical quality, evaluation, and simulation; computer guidelines engineering and usage; and comorbidity and clinical process management.
This book constitutes the proceedings of the 30th International Conference on Architecture of Computing Systems, ARCS 2017, held in Vienna, Austria, in April 2017. The 19 full papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections entitled: resilience; memory systems;
This book constitutes the proceedings of the 15th IFIP International Conference on Wired/Wireless Internet Communications, WWIC 2017, held in St. Petersburg, Russia, in June 2017. They were organized in topical sections named: network analysis and dimensioning; network design and planning;
This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions.
This book constitutes the proceedings of the International Joint Conference on Rules and Reasoning, RuleML+RR 2017, held in London, UK, during July 2017. This is the first conference of a new series, joining the efforts of two existing conference series, namely "RuleML" (International Web Rule Symposium) and "RR" (Web Reasoning and Rule Systems).
This book constitutes the refereed proceedings of the 5th International Conference on Serviceology for Services, held in Vienna, Austria, in July 2017. The 21 full papers and one tutorial paper presented in this volume were carefully reviewed and selected from 75 submissions.
This book constitutes the proceedings of the 15th International Conference on Applied Cryptology and Network Security, ACNS 2017, held in Kanazawa, Japan, in July 2017. The 34 papers presented in this volume were carefully reviewed and selected from 149 submissions.
This book constitutes the thoroughly refereed post-workshop proceedings of the International Workshop on Medical Computer Vision, MCV 2016, and of the International Workshop on Bayesian and grAphical Models for Biomedical Imaging, BAMBI 2016, held in Athens, Greece, in October 2016, held in conjunction with the 19th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2016.The 13 papers presented in MCV workshop and the 6 papers presented in BAMBI workshop were carefully reviewed and selected from numerous submissions.The goal of the MCV workshop is to explore the use of "big dataΓÇ¥ algorithms for harvesting, organizing and learning from large-scale medical imaging data sets and for general-purpose automatic understanding of medical images.The BAMBI workshop aims to highlight the potential of using Bayesian or random field graphical models for advancing research in biomedical image analysis.
This book constitutes the refereed proceedings of the 31st Annual IFIP WG 11.3 International Working Conference on Data and Applications Security and Privacy, DBSec 2017, held in Philadelphia, PA, USA, in July 2017. The 21 full papers and 9 short papers presented were carefully reviewed and selected from 59 submissions.
Today, when a security incident happens, the top three questions a cyber operation center would ask are: What has happened? Why did it happen? What should I do? Answers to the first two questions form the core of Cyber Situation Awareness (SA). Whether the last question can be satisfactorily addressed is largely dependent upon the cyber situation awareness capability of an enterprise.The goal of this book is to present a summary of recent research advances in the development of highly desirable Cyber Situation Awareness capabilities.The 8 invited full papers presented in this volume are organized around the following topics: computer-aided human centric cyber situation awareness; computer and information science aspects of the recent advances in cyber situation awareness; learning and decision making aspects of the recent advances in cyber situation awareness; cognitive science aspects of the recent advances in cyber situation awareness
This volume contains lecture notes of the 13th Reasoning Web Summer School (RW 2017), held in London, UK, in July 2017. In 2017, the theme of the school was "Semantic Interoperability on the Web", which encompasses subjects such as data integration, open data management, reasoning over linked data, database to ontology mapping, query answering over ontologies, hybrid reasoning with rules and ontologies, ontology-based dynamic systems. Lectures of Reasoning Web 2017 were focused on these topics and also addressed foundational reasoning techniques used in answer set programming and ontologies.
The theme of ICCBR-2017, "Analogy for Reuse", was highlighted in several events.These papers, which are included in the proceedings, address many themes related to the theory and application of case-based reasoning, analogical reasoning, CBR and Deep Learning, CBR in the Health Sciences, Computational Analogy, and Process-Oriented CBR.
The 2-volume set LNCS 10324 and 10325 constitutes the refereed proceedings of the 4th International Conference on Augmented Reality, Virtual Reality, and Computer Graphics, AVR 2017, held in Ugento, Italy, in June 2017. The 54 full papers and 24 short papers presented were carefully reviewed and selected from 112 submissions.
The 2-volume set LNCS 10324 and 10325 constitutes the refereed proceedings of the 4th International Conference on Augmented Reality, Virtual Reality, and Computer Graphics, AVR 2017, held in Ugento, Italy, in June 2017. The 54 full papers and 24 short papers presented were carefully reviewed and selected from 112 submissions.
This book constitutes the refereed proceedings of the 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2017, held in Bonn, Germany, in July 2017. The 18 revised full papers included in this book were carefully reviewed and selected from 67 submissions. malware analysis;
The selected papers covered a wide variety of important topics in the area of data mining, including parallel and distributed data mining algorithms, mining on data streams, graph mining, spatial data mining, multimedia data mining, Web mining, the Internet of Things, health informatics, and biomedical data mining.
This book constitutes the refereed proceedings of the 16th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2016, held in Granada, Spain, in December 2016. The 30 full papers and 22 short papers presented were carefully reviewed and selected from 117 submissions.
This book constitutes the thoroughly refereed post-workshop proceedings of the 17th Chinese Lexical Semantics Workshop, CLSW 2016, held in Singapore, Singapore, in May 2016. The 70 regular papers included in this volume were carefully reviewed and selected from 182 submissions.
This volume contains some lecture notes of the 12th Reasoning Web Summer School (RW 2016), held in Aberdeen, UK, in September 2016.In 2016, the theme of the school was ¿Logical Foundation of Knowledge Graph Construction and Query Answering¿. The notion of knowledge graph has become popular since Google started to use it to improve its search engine in 2012. Inspired by the success of Google, knowledge graphs are gaining momentum in the World Wide Web arena. Recent years have witnessed increasing industrial take-ups by other Internet giants, including Facebook's Open Graph and Microsoft's Satori. The aim of the lecture note is to provide a logical foundation for constructing and querying knowledge graphs. Our journey starts from the introduction of Knowledge Graph as well as its history, and the construction of knowledge graphs by considering both explicit and implicit author intentions. The book will then cover various topics, including how to revise and reuseontologies (schema of knowledge graphs) in a safe way, how to combine navigational queries with basic pattern matching queries for knowledge graph, how to setup a environment to do experiments on knowledge graphs, how to deal with inconsistencies and fuzziness in ontologies and knowledge graphs, and how to combine machine learning and machine reasoning for knowledge graphs.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.