Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This volume constitutes the refereed post-conference proceedings of the Second IFIP TC 5 DCITDRR International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2017, held in Sofia, Bulgaria, in October 2017. The 16 revised full papers presented were carefully reviewed and selected from 43 submissions.
This book constitutes the refereed proceedings of the 8th IFIP WG 11.8 World Conference on Security Education, WISE 8, held in Auckland, New Zealand, in July 2013. It also includes papers from WISE 6, held in Bento Goncalves, Brazil, in July 2009 and WISE 7, held in Lucerne, Switzerland in June 2011.
They are organized in topical sections on machine learning, deep learning, multi-agent systems, neural computing and swarm intelligence, natural language processing, recommendation systems, social computing, business intelligence and security, pattern recognition, and image understanding.
This book constitutes the refereed proceedings of the Third International Conference on Intelligence Science, ICIS 2018, held in Beijing China, in November 2018. The 44 full papers and 5 short papers presented were carefully reviewed and selected from 85 submissions.
This book constitutes the refereed proceedings of the 18th International TRIZ Future Conference on Automated Invention for Smart Industries, held in Strasbourg, France, in October 2018 and sponsored by IFIP WG 5.4. The 27 full papers presented were carefully reviewed and selected from numerous submissions.
This book constitutes the refereed proceedings of the 11th IFIP TC 12 International Conference on Intelligent Information Processing, IIP 2020, held in Hangzhou, China, in July 2020. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 36 submissions. and computer vision and image understanding.
Environmental Informatics is a fast growing field which deals with all methods from computer science, environmental planning, ecology and related subjects. As well as being an interdisciplinary area, Environmental Informatics provides an interface between all involved professional groups.
With the rapid growth in internet and www facilities, database security will always be a key topic in business and in the public sector and has implications for the whole of society. This book covers issues related to security and privacy of information in a range of applications, including: electronic commerce; workflow; privacy; and, mediation.
Feature-based technology is the key factor towards meeting the increasingly high demands of improving and speeding up the product development process from concept to customer feedback, and is therefore expected to be able to provide for a better approach to integrate the complete product design process chain.
Knowledge Intensive Design Technology is a collection of papers presented at the Fifth Workshop on Knowledge Intensive CAD, which was sponsored by the International Federation for Information Processing (IFIP) Working Group 5.2 and hosted by the Department of Manufacturing Engineering at the University of Malta in July 2002.
The Architecture of Scientific Software addresses emerging methodologies and tools for the rational design of scientific software, including component integration frameworks, network-based computing, formal methods of abstraction, application programmer interface design, and the role of object-oriented languages.
Yet, there are a number of issues that has been worked on in various standards bodies, government and industry research and development labs, and universities towards enabling high speed networks in general and ATM networks in particular.
This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics.
ADVANCES IN DIGITAL FORENSICS XIVEdited by: Gilbert Peterson and Sujeet ShenoiDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence.
They are organized in topical sections on machine learning, deep learning, multi-agent systems, neural computing and swarm intelligence, natural language processing, recommendation systems, social computing, business intelligence and security, pattern recognition, and image understanding.
This book contains a range of invited and submitted papers presented at the 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Karlstad, Sweden, in August 2016.The 17 revised full papers and one short paper included in this volume were carefully selected from a total of 42 submissions and were subject to a two-step review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological.The paper 'Big Data Privacy and Anonymization' is published open access under a CC BY 4.0 license at link.springer.com.
This book constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference "ICT Unbounded, Social Impact of Bright ICT Adoption" on Transfer and Diffusion of IT, TDIT 2019, held in Accra, Ghana, in June 2019.
This book constitutes the refereed proceedings of the 13th IFIP TC 9 International Conference on Human Choice and Computers, HCC13 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 29 revised full papers presented were carefully reviewed and selected from 48 submissions.
This volume constitutes the refereed and revised post-conference proceedings of the 4th IFIP TC 5 DCITDRR International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2019, in Kyiv, Ukraine, in October 2019. The 17 full papers and 2 short papers presented were carefully reviewed and selected from 53 submissions.
This book constitutes the refereed proceedings of the 9th IFIP WG 11.8 World Conference on Security Education, WISE 9, held in Hamburg, Germany, in May 2015. The 11 revised papers presented together with 2 invited papers were carefully reviewed and selected from 20 submissions.
This book contains a range of keynote papers and submitted papers presented at the 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Patras, Greece, in September 2014.
This book constitutes the refereed proceedings of the 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2020, held in Costa de Caparica, Portugal, in July 2020.
This 2 volume-set of IFIP AICT 583 and 584 constitutes the refereed proceedings of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, held in Neos Marmaras, Greece, in June 2020.*The 70 full papers and 5 short papers presented were carefully reviewed and selected from 149 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections:Part I: classification; clustering - unsupervised learning -analytics; image processing; learning algorithms; neural network modeling; object tracking - object detection systems; ontologies - AI; and sentiment analysis - recommender systems. Part II: AI ethics - law; AI constraints; deep learning - LSTM; fuzzy algebra - fuzzy systems; machine learning; medical - health systems; and natural language.*The conference was held virtually due to the COVID-19 pandemic.
This 2 volume-set of IFIP AICT 583 and 584 constitutes the refereed proceedings of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, held in Neos Marmaras, Greece, in June 2020.*The 70 full papers and 5 short papers presented were carefully reviewed and selected from 149 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections:Part I: classification; clustering - unsupervised learning -analytics; image processing; learning algorithms; neural network modeling; object tracking - object detection systems; ontologies - AI; and sentiment analysis - recommender systems. Part II: AI ethics - law; AI constraints; deep learning - LSTM; fuzzy algebra - fuzzy systems; machine learning; medical - health systems; and natural language.*The conference was held virtually due to the COVID-19 pandemic.
This book constitutes the refereed proceedings of two International Workshops held as parallel events of the 16th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2020, in Neos Marmaras, Greece, in June 2020: the 9th Mining Humanistic Data Workshop, MHDW 2020, and the 5th Workshop on 5G-Putting Intelligence to the Network Edge, 5G-PINE 2020.* The 6 full papers and 3 short papers presented at MHDW 2020 were carefully reviewed and selected from 16 submissions; out of the 23 papers submitted to 5G-PINE 2020, 11 were accepted as full papers and 1 as a short paper. The MHDW papers focus on topics such as recommendation systems, sentiment analysis, pattern recognition, data mining, and time series. The papers presented at 5G-PINE focus on the latest AI applications in the telecommunication industry and deal with topics such as the Internet of Things, intelligence fusion in 5G networks, and 5G media.*The workshops were held virtually due to the COVID-19 pandemic.
Dear readers, Although it is well-known that confidentiality, integrity and availability are high level objectives of information security, much of the attention in the security arena has been devoted to the confidentiality and availability aspects of security.
The topics covered range from ontology to knowledge representation, making it essential reading for researchers, engineers, and technical managers involved in the development of advanced applications for knowledge management, engineering design, and manufacturing.
Contains the papers presented and discussed at the conference that was held in May/June 1997, in Philadelphia, Pennsylvania, USA, and that was sponsored by Working Group 8.2 of the International Federation for Information Processing. This book is useful for professionals and students working in information systems in a business environment.
FORTE/PSTV '97 addresses Formal Description Techniques (FDTs) applicable to Distributed Systems and Communication Protocols (such as Estelle, LOTOS, SDL, ASN.1, TTCN, Z, Automata, Process Algebra, Logic).
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.