Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book constitutes the refereed conference proceedings of the Third International Conference on Big Data Analytics, BDA 2014, held in New Delhi, India, in December 2014. The 11 revised full papers and 6 short papers were carefully reviewed and selected from 35 submissions and cover topics on media analytics; geospatial big data; semantics and data models; search and retrieval; graphics and visualization; application-specific big data.
This book constitutes the refereed conference proceedings of the 13th International Conference on Intelligent Data Analysis, which was held in October/November 2014 in Leuven, Belgium. The 33 revised full papers together with 3 invited papers were carefully reviewed and selected from 70 submissions handling all kinds of modeling and analysis methods, irrespective of discipline. The papers cover all aspects of intelligent data analysis, including papers on intelligent support for modeling and analyzing data from complex, dynamical systems.
This book constitutes the refereed proceedings of the 2014 Multidisciplinary International Social Networks Research, MISNC 2014, held in Kaohsiung, Taiwan, in September 2014. The 37 full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on electronic commerce, e-business management, and social networks; social networks issues on sociology, politics and statistics; information technology for social networks analysis and mining; social networks for global eHealth and bio-medics; security, open data, e-learning and other related topics; intelligent data analysis and its applications.
This book constitutes the proceedings of the 15th International Conference on Web Information Systems Engineering, WISE 2014, held in Thessaloniki, Greece, in October 2014. The 52 full papers, 16 short and 14 poster papers, presented in the two-volume proceedings LNCS 8786 and 8787 were carefully reviewed and selected from 196 submissions. They are organized in topical sections named: Web mining, modeling and classification; Web querying and searching; Web recommendation and personalization; semantic Web; social online networks; software architectures amd platforms; Web technologies and frameworks; Web innovation and applications; and challenge.
This book constitutes the proceedings of the 9th International Conference on Internet and Distributed Computing Systems, IDCS 2016, held in Wuhan, China, in September 2016.The 30 full papers and 18 short papers presented in this volume were carefully reviewed and selected from 78 submissions. They were organized in topical sections named: body sensor networks and wearable devices; cloud computing and networking; distributed computing and big data; distributed scheduling and optimization; internet of things and its application; smart networked transportation and logistics; and big data and social networks.
This book constitutes the refereed proceedings of the 6th International Conference on Model and Data Engineering, MEDI 2016, held in Almeria, Spain, in September 2016.The 17 full papers and 10 short papers presented together with 2 invited talks were carefully reviewed and selected from 62 submissions. The papers range on a wide spectrum covering fundamental contributions, applications and tool developments and improvements in model and data engineering activities.
This book constitutes the refereed proceedings of the 22st Annual European Symposium on Algorithms, ESA 2014, held in Wroclaw, Poland, in September 2014, as part of ALGO 2014. The 69 revised full papers presented were carefully reviewed and selected from 269 initial submissions: 57 out of 221 in Track A, Design and Analysis, and 12 out of 48 in Track B, Engineering and Applications. The papers present original research in the areas of design and mathematical analysis of algorithms; engineering, experimental analysis, and real-world applications of algorithms and data structures.
This book constitutes the refereed proceedings of the workshops held at the 16th Asia-Pacific Web Conference, APWeb 2014, in Changsha, China, in September 2014. The 34 full papers were carefully reviewed and selected from 59 submissions. This volume presents the papers that have been accepted for the following workshops: First International Workshop on Social Network Analysis, SNA 2014; First International Workshop on Network and Information Security, NIS 2014; First International Workshop on Internet of Things Search, IoTS 2014. The papers cover various issues in social network analysis, security and information retrieval against the heterogeneous big data.
This book constitutes the refereed proceedings of the 8th International Conference on Web Reasoning and Rule Systems, RR 2014, held in Athens, Greece in September 2014. The 9 full papers, 9 technical communications and 5 poster presentations presented together with 3 invited talks, 3 doctoral consortial papers were carefully reviewed and selected from 33 submissions. The conference covers a wide range of the following: semantic Web, rule and ontology languages, and related logics, reasoning, querying, searching and optimization, incompleteness, inconsistency and uncertainty, non-monotonic, common sense, and closed-world reasoning for the web, dynamic information, stream reasoning and complex event processing, decision making, planning, and intelligent agents, machine learning, knowledge extraction and information retrieval, data management, data integration and reasoning on the web of data, ontology-based data access, system descriptions, applications and experiences.
Video segmentation is the most fundamental process for appropriate index- ing and retrieval of video intervals. In general, video streams are composed 1 of shots delimited by physical shot boundaries. Substantial work has been done on how to detect such shot boundaries automatically (Arman et aI. , 1993) (Zhang et aI. , 1993) (Zhang et aI. , 1995) (Kobla et aI. , 1997). Through the inte- gration of technologies such as image processing, speech/character recognition and natural language understanding, keywords can be extracted and associated with these shots for indexing (Wactlar et aI. , 1996). A single shot, however, rarely carries enough amount of information to be meaningful by itself. Usu- ally, it is a semantically meaningful interval that most users are interested in re- trieving. Generally, such meaningful intervals span several consecutive shots. There hardly exists any efficient and reliable technique, either automatic or manual, to identify all semantically meaningful intervals within a video stream. Works by (Smith and Davenport, 1992) (Oomoto and Tanaka, 1993) (Weiss et aI. , 1995) (Hjelsvold et aI. , 1996) suggest manually defining all such inter- vals in the database in advance. However, even an hour long video may have an indefinite number of meaningful intervals. Moreover, video data is multi- interpretative. Therefore, given a query, what is a meaningful interval to an annotator may not be meaningful to the user who issues the query. In practice, manual indexing of meaningful intervals is labour intensive and inadequate.
This book constitutes the Proceedings of the IFIP Working Conference PRO- COMET'98, held 8-12 June 1998 at Shelter Island, N.Y. The conference is organized by the t'wo IFIP TC 2 Working Groups 2.2 Formal Description of Programming Concepts and 2.3 Programming Methodology. WG2.2 and WG2.3 have been organizing these conferences every four years for over twenty years. The aim of such Working Conferences organized by IFIP Working Groups is to bring together leading scientists in a given area of computer science. Participation is by invitation only. As a result, these conferences distinguish themselves from other meetings by extensive and competent technical discus- sions. PROCOMET stands for Programming Concepts and Methods, indicating that the area of discussion for the conference is the formal description of pro- gramming concepts and methods, their tool support, and their applications. At PROCOMET working conferences, papers are presented from this whole area, reflecting the interest of the individuals in WG2.2 and WG2.3.
Automatic Indexing and Abstracting of Document Texts summarizes the latest techniques of automatic indexing and abstracting, and the results of their application. It also places the techniques in the context of the study of text, manual indexing and abstracting, and the use of the indexing descriptions and abstracts in systems that select documents or information from large collections. Important sections of the book consider the development of new techniques for indexing and abstracting. The techniques involve the following: using text grammars, learning of the themes of the texts including the identification of representative sentences or paragraphs by means of adequate cluster algorithms, and learning of classification patterns of texts. In addition, the book is an attempt to illuminate new avenues for future research. Automatic Indexing and Abstracting of Document Texts is an excellent reference for researchers and professionals working in the field of content management and information retrieval.
The Center for Intelligent Information Retrieval (CIIR) was formed in the Computer Science Department ofthe University ofMassachusetts, Amherst in 1992. The core support for the Center came from a National Science Foun- tion State/Industry/University Cooperative Research Center(S/IUCRC) grant, although there had been a sizeable information retrieval (IR) research group for over 10 years prior to that grant. Thebasic goal ofthese Centers is to combine basic research, applied research, and technology transfer. The CIIR has been successful in each of these areas, in that it has produced over 270 research papers, has been involved in many successful government and industry collaborations, and has had a significant role in high-visibility Internet sites and start-ups. As a result of these efforts, the CIIR has become known internationally as one of the leading research groups in the area of information retrieval. The CIIR focuses on research that results in more effective and efficient access and discovery in large, heterogeneous, distributed, text and multimedia databases. The scope of the work that is done in the CIIR is broad and goes significantly beyond "e;traditional"e; areas of information retrieval such as retrieval models, cross-lingual search, and automatic query expansion. The research includes both low-level systems issues such as the design of protocols and architectures for distributed search, as well as more human-centered topics such as user interface design, visualization and data mining with text, and multimedia retrieval.
Security and privacy are paramount concerns in information processing systems, which are vital to business, government and military operations and, indeed, society itself. Meanwhile, the expansion of the Internet and its convergence with telecommunication networks are providing incredible connectivity, myriad applications and, of course, new threats. Data and Applications Security XVII: Status and Prospects describes original research results, practical experiences and innovative ideas, all focused on maintaining security and privacy in information processing systems and applications that pervade cyberspace. The areas of coverage include: -Information Warfare, -Information Assurance, -Security and Privacy, -Authorization and Access Control in Distributed Systems, -Security Technologies for the Internet, -Access Control Models and Technologies, -Digital Forensics. This book is the seventeenth volume in the series produced by the International Federation for Information Processing (IFIP) Working Group 11.3 on Data and Applications Security. It presents a selection of twenty-six updated and edited papers from the Seventeenth Annual IFIP TC11 / WG11.3 Working Conference on Data and Applications Security held at Estes Park, Colorado, USA in August 2003, together with a report on the conference keynote speech and a summary of the conference panel. The contents demonstrate the richness and vitality of the discipline, and other directions for future research in data and applications security. Data and Applications Security XVII: Status and Prospects is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector.
Smart cards or IC cards offer a huge potential for information processing purposes. The portability and processing power of IC cards allow for highly secure conditional access and reliable distributed information processing. IC cards that can perform highly sophisticated cryptographic computations are already available. Their application in the financial services and telecom industries are well known. But the potential of IC cards go well beyond that. Their applicability in mainstream Information Technology and the Networked Economy is limited mainly by our imagination; the information processing power that can be gained by using IC cards remains as yet mostly untapped and is not well understood. Here lies a vast uncovered research area which we are only beginning to assess, and which will have a great impact on the eventual success of the technology. The research challenges range from electrical engineering on the hardware side to tailor-made cryptographic applications on the software side, and their synergies. This volume comprises the proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), which was sponsored by the International Federation for Information Processing (IFIP) and held at the Hewlett-Packard Labs in the United Kingdom in September 2000. CARDIS conferences are unique in that they bring together researchers who are active in all aspects of design of IC cards and related devices and environments, thus stimulating synergy between different research communities from both academia and industry. This volume presents the latest advances in smart card research and applications, and will be essential reading for smart card developers, smart card application developers, and computer science researchers involved in computer architecture, computer security, and cryptography.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.