Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This volume contains selected papers presented at ICFCA 2010, the 8th Int- national Conference on Formal Concept Analysis. The ICFCA conference series aims to be the prime forum for dissemination of advances in applied lattice and order theory, and in particular advances in theory and applications of Formal Concept Analysis. Formal Concept Analysis (FCA) is a ?eld of applied mathematics with its mathematical root in order theory, in particular the theory of complete lattices. Researchershadlongbeenawareofthefactthatthese?eldshavemanypotential applications.FCAemergedinthe1980sfrome?ortstorestructurelattice theory to promote better communication between lattice theorists and potential users of lattice theory. The key theme was the mathematical formalization of c- cept and conceptual hierarchy. Since then, the ?eld has developed into a growing research area in its own right with a thriving theoretical community and an - creasingnumberofapplicationsindataandknowledgeprocessingincludingdata visualization, information retrieval, machine learning, sofware engineering, data analysis, data mining in Web 2.0, analysis of social networks, concept graphs, contextual logic and description logics. ICFCA 2010 took place during March 15-18, 2010 in Agadir, Morocco. We received 37 high-quality submissions out of which 17 were chosen as regular papers in these proceedings after a competitive selection process. Less mature works that were still considered valuable for discussion at the conference were collected in the supplementary proceedings. The papers in the present volume coveradvancesinvariousaspectsofFCArangingfromitstheoreticalfoundations to its applications in numerous other ?elds. In addition to the regular papers, thisvolumealsocontainsfourkeynotepapersarisingfromtheseveninvitedtalks given at the conference. We are also delighted to include a reprint of Bernhard Ganter'sseminalpaper on hiswell-knownalgorithmfor enumerating closedsets.
The Second International Conference on High-Performance Computing and Appli- tions (HPCA 2009) was a follow-up event of the successful HPCA 2004. It was held in Shanghai, a beautiful, active, and modern city in China, August 10-12, 2009. It served as a forum to present current work by researchers and software developers from around the world as well as to highlight activities in the high-performance c- puting area. It aimed to bring together research scientists, application pioneers, and software developers to discuss problems and solutions and to identify new issues in this area. This conference emphasized the development and study of novel approaches for high-performance computing, the design and analysis of high-performance - merical algorithms, and their scientific, engineering, and industrial applications. It offered the conference participants a great opportunity to exchange the latest research results, heighten international collaboration, and discuss future research ideas in HPCA. In addition to 24 invited presentations, the conference received over 300 contr- uted submissions from over ten countries and regions worldwide, about 70 of which were accepted for presentation at HPCA 2009. The conference proceedings contain some of the invited presentations and contributed submissions, and cover such research areas of interest as numerical algorithms and solutions, high-performance and grid c- puting, novel approaches to high-performance computing, massive data storage and processing, hardware acceleration, and their wide applications.
QUANTUMCOMM 2009--the International Conference on Quantum Communi- tion and Quantum Networking (from satellite to nanoscale)--took place in Vico Equense near Naples, Italy, during October 26-30, 2009. The conference made a significant step toward stimulating direct dialogue between the communities of quantum physics and quantum information researchers who work with photons, atoms, and electrons in pursuit of the common goal of investigating and utilizing the transfer of physical information between quantum systems. This meeting brought together experts in quantum communication, quantum inf- mation processing, quantum nanoscale physics, quantum photonics, and networking. In the light of traditional approaches to quantum information processing, quantum communication mainly deals with encoding and securely distributing quantum states of light in optical fiber or in free space in order to provide the technical means for quantum cryptography applications. Exciting advances in the area of quantum c- munication over the last decade have made the metropolitan quantum network a re- ity. Several papers presented at this meeting have demonstrated that quantum crypt- raphy is approaching the point of becoming a high-tech application rather than a - search subject. The natural distance limitation of quantum cryptography has been significantly augmented using ideas of global quantum communication with stab- orbit satellites. The results presented at this conference demonstrated that practical secure satellite communication is clearly within reach.
Similarity-based learning methods have a great potential as an intuitive and ?exible toolbox for mining, visualization,and inspection of largedata sets. They combine simple and human-understandable principles, such as distance-based classi?cation, prototypes, or Hebbian learning, with a large variety of di?erent, problem-adapted design choices, such as a data-optimum topology, similarity measure, or learning mode. In medicine, biology, and medical bioinformatics, more and more data arise from clinical measurements such as EEG or fMRI studies for monitoring brain activity, mass spectrometry data for the detection of proteins, peptides and composites, or microarray pro?les for the analysis of gene expressions. Typically, data are high-dimensional, noisy, and very hard to inspect using classic (e. g. , symbolic or linear) methods. At the same time, new technologies ranging from the possibility of a very high resolution of spectra to high-throughput screening for microarray data are rapidly developing and carry thepromiseofane?cient,cheap,andautomaticgatheringoftonsofhigh-quality data with large information potential. Thus, there is a need for appropriate - chine learning methods which help to automatically extract and interpret the relevant parts of this information and which, eventually, help to enable und- standingofbiologicalsystems,reliablediagnosisoffaults,andtherapyofdiseases such as cancer based on this information. Moreover, these application scenarios pose fundamental and qualitatively new challenges to the learning systems - cause of the speci?cs of the data and learning tasks. Since these characteristics are particularly pronounced within the medical domain, but not limited to it and of principled interest, this research topic opens the way toward important new directions of algorithmic design and accompanying theory.
In recent years, Internet-based systems and applications have become pervasive and have been the focus of many ongoing research efforts. They range from semi-structured information, to multimedia systems and applications, to P2P and ad hoc information sharing networks and service-centric systems and applications. This book p- sents a collection of articles from the best papers presented at the SITIS 2006 International Conference, aiming to cover recent advanced research on distributed information systems, including both theoretical and applied solutions. This volume is designed for a professional audience practitioners and researchers in industry. It is also suitable as a reference or secondary text for advanced-level students in computer science and engineering. The articles in this book are a selection of papers presented at the IMRT and WITDS tracks of the international SITIS 2006 conference. The authors were asked to revise and extend their contributions to take into account the comments and discussions made at the conference. A large number of high-quality papers were submitted to SITIS 2006, demonstrating the growing interest of the - search community for Internet-Based and multimedia information systems. We would like to acknowledge the hard work and dedication of many people. Our deepest gratitude goes to the authors who contributed their work. We appreciate the diligent work of the SITIS Committee members. We are grateful for the help, support and patience of the LNCS publishing team. Finally, thanks to Iwayan Wikacsana for his invaluable help. February 2007 Ernesto Damiani Kokou Yetongnon Richard Chbeir Albert Dipanda
Responsive Computer Systems: Steps Towards Fault-Tolerant Real-Time Systems provides an extensive treatment of the most important issues in the design of modern Responsive Computer Systems. It lays the groundwork for a more comprehensive model that allows critical design issues to be treated in ways that more traditional disciplines of computer research have inhibited. It breaks important ground in the development of a fruitful, modern perspective on computer systems as they are currently developing and as they may be expected to develop over the next decade. Audience: An interesting and important road map to some of the most important emerging issues in computing, suitable as a secondary text for graduate level courses on responsive computer systems and as a reference for industrial practitioners.
This book constitutes the refereed proceedings of the 5th International Symposium on Bioinformatics Research and Applications, ISBRA 2009, held in Fort Lauderdale, FL, USA, in May 2009. The 26 revised full papers presented together four invited papers were carefully reviewed and selected from a total of 55 submissions. The papers cover a wide range of topics, including clustering and classification, gene expression analysis, gene networks, genome analysis, motif finding, pathways, protein structure prediction, protein domain interactions, phylogenetics, and software tools.
The Ninth International Conference on Reliable Software Technologies, Ada- Europe 2004, took place in Palma, Spain, June 14-18, 2004. It was sponsored by Ada-Europe, the European federation of national Ada societies, and Ada- Spain, in cooperation with ACM SIGAda. It was organized by members of the University of the Balearic Islands (UIB). As in past years, the conference comprised a three-day technical program, during which the papers contained in these proceedings were presented, along with vendor presentations. The technical program was bracketed by two tutorial days, when the attendees had the opportunity to catch up on a variety of topics related to the ?eld, at both introductory and advanced levels. Furthermore, the conference was accompanied by an exhibition where vendors presented their products for supporting reliable-software development. Invited Speakers Theconferencepresentedfourdistinguishedspeakers,whodeliveredstate-of-t- art information on topics of great importance, both for now and for the future of software engineering: - S. Tucker Taft, SoftCheck Inc., USA Fixing software before it breaks: using static analysis to help solve the so- ware quality quagmire - Martin Gogolla, University of Bremen, Germany Bene?ts and problems of formal methods - Antoni Oliv' e, Polytechnical University of Catalonia, Spain On the role of conceptual schemas in information systems' development - Stephen Vinoski, IONA Technologies in Waltham, USA Can middleware be reliable? Wewouldliketoexpressoursinceregratitudetothesedistinguishedspeakers, well known to the community, for sharing their insights with the conference participants. Submitted Papers Alargenumberofpapersweresubmitted,fromasmanyas15di?erentcountries.
nd Welcome to the proceedings of PERVASIVE 2004, the 2 International C- ference on Pervasive Computing and the premier forum for the presentation and appraisal of the most recent and most advanced research results in all - undational and applied areas of pervasive and ubiquitous computing. Consi- ring the half-life period of technologies and knowledge this community is facing, PERVASIVE is one of the most vibrant, dynamic, and evolutionary among the computer-science-related symposia and conferences. The research challenges, e?orts, and contributions in pervasive computing have experienced a breathtaking acceleration over the past couple of years, mostly due to technological progress, growth, and a shift of paradigms in c- puter science in general. As for technological advances, a vast manifold of tiny, embedded, and autonomous computing and communication systems have st- ted to create and populate a pervasive and ubiquitous computing landscape, characterized by paradigms like autonomy, context-awareness, spontaneous - teraction, seamless integration, self-organization, ad hoc networking, invisible services, smart artifacts, and everywhere interfaces. The maturing of wireless networking, miniaturized information-processing possibilities induced by novel microprocessor technologies, low-power storage systems, smart materials, and technologies for motors, controllers, sensors, and actuators envision a future computing scenario in which almost every object in our everyday environment will be equipped with embedded processors, wireless communication facilities, and embedded software to perceive, perform, and control a multitude of tasks and functions.
This book constitutes the refereed proceedings of the Third International Conference on Embedded Software, EMSOFT 2003, held in Philadelphia, PA, USA in October 2003.The 20 revised full papers presented together with three invited papers were carefully reviewed and selected from 60 submissions. All current topics in embedded software are addressed: formal methods and model-based development, middleware and fault tolerance, modelling and analysis, programming languages and compilers, real-time scheduling, resource-aware systems, and systems on a chip.
This volume contains the proceedings of the 7th International Workshop on Software and Compilers for Embedded Systems, SCOPES 2003, held in Vienna, Austria, September 24-26, 2003. Initially, the workshop was referred to as the International Workshop on Code Generation for Embedded Systems. The ?rst workshop took place in 1994 in Schloss Dagstuhl, Germany. From its beg- nings, the intention of the organizers was to create an atmosphere in which the researcherscould participateactively in dynamic discussionsand pro?t from the assembly of international experts in the ?eld. It was at the fourth workshop, in St. Goar, Germany, in 1999, that the spectrum of topics of interest for the workshop was extended, and not only code generation, but also software and compilers for embedded systems, were considered. The change in ?elds of interest led to a change of name, and this is when the present name was used for the ?rst time. Since then, SCOPES has been held again in St. Goar, Germany, in 2001; Berlin, Germany, in 2002; and this year, 2003, in Vienna, Austria. In response to the call for papers, 43 very strong papers from all over the world were submitted. The program committee selected 26 papers for pres- tation at SCOPES 2003. All submitted papers were reviewed by at least three experts in order to ensure the quality of the work presented at the workshop.
The 2003 Information Security Conference was the sixth in a series that started with the InformationSecurity Workshopin 1997.A distinct feature of this series is the wide coverage of topics with the aim of encouraging interaction between researchers in di?erent aspects of information security. This trend continued in the program of this year's conference. There were 133 paper submissions to ISC 2003. From these submissions the 31papersintheseproceedingswereselectedbytheprogramcommittee,covering a wide range of technical areas. These papers are supplemented by two invited papers;athirdinvitedtalkwaspresentedattheconferencebutisnotrepresented by a written paper. We would like to extend our sincere thanks to all the authors that submitted papers to ISC 2003, and we hope that those whose papers were declined will be able to ?nd an alternative forum for their work. We are also very grateful to the three eminent invited speakers at the conference: Paul van Oorschot (Carleton University, Canada), Ueli Maurer (ETH Zur * ich, Switzerland), and Andy Clark (Inforenz Limited, UK). We were fortunate to have an energetic team of experts who took onthe task of the program committee. Their names may be found overleaf, and we thank them warmly for their considerable e?orts. This team was helped by an even larger number of individuals who reviewed papers in their particular areas of expertise. A list of these names is also provided, which we hope is complete.
UbiComp 2003, the 5th Annual Conference on Ubiquitous Computing, is the premier forum for presentation of research results in all areas relating to the - sign, implementation, deployment and evaluation of ubiquitous computing te- nologies. The conference brings together leading researchers, from a variety of disciplines, perspectives and geographical areas, who are exploring the impli- tions of computing as it moves beyond the desktop and becomes increasingly interwoven into the fabrics of our lives. This volume, the conference proceedings, contains the entire collection of high-quality full papers and technical notes from UbiComp 2003. There were 16 full papers in this year's conference, selected by our international program committee from among 117 submissions. There were also 11 technical notes in the program: 8 taken from the 36 technical note submissions, and 3 that were adapted from full paper submissions. We are very grateful to Tim Kindberg and Bernt Schiele, our Technical Notes Co-chairs, and to all the authors and reviewers of both papers and technical notes who contributed to maintaining the high standards of quality for the conference. In addition to the full papers and technical notes, UbiComp 2003 also p- vided a number of other participation categories, including workshops, dem- strations, interactive posters, a panel, a doctoral colloquium and a video p- gram. While accepted submissions in these categories were also of high quality, timing and size constraints prevented us from including them in this volume.
The8thInternationalConferenceonReliableSoftwareTechnologies,Ada-Europe 2003,tookplaceinToulouse,France,June18-20,2003.ItwassponsoredbyAda- Europe, the European federation of national Ada societies, and Ada-France, in cooperation with ACM SIGAda. It was organized by members of Adalog, CS, UPS/IRIT and ONERA. Toulouse was certainly a very appropriate place for this conference. As the heart of the European aeronautic and space industry, it is a place where so- ware development leaves no place for failure. In the end, reliability is a matter of human skills. But these skills build upon methods, tools, components and c- trolled practices. By exposing the latest advances in these areas, the conference contributed to ful?lling the needs of a very demanding industry. As in past years, the conference comprised a three-day technical program, during which the papers contained in these proceedings were presented, along with vendor presentations. The technical program was bracketed by two tutorial days, when attendees had the opportunity to catch up on a variety of topics related to the ?eld, at both introductory and advanced levels. On Friday, a workshopon"e;QualityofServiceinComponent-BasedSoftwareEngineering"e;was held. Further, the conference was accompanied by an exhibition where vendors presented their reliability-related products.
The Sixth International Conference on Reliable Software Technologies, Ada- Europe 2001, took place in Leuven, Belgium, May 14-18, 2001. It was sponsored by Ada-Europe, the European federation of national Ada societies, in cooperation with ACM SIGAda, and it was organized by members of the K.U. Leuven and Ada- Belgium. This was the 21st consecutive year of Ada-Europe conferences and the sixth year of the conference focusing on the area of reliable software technologies. The use of software components in embedded systems is almost ubiquitous: planes fly by wire, train signalling systems are now computer based, mobile phones are digital devices, and biological, chemical, and manufacturing plants are controlled by software, to name only a few examples. Also other, non-embedded, mission-critical systems depend more and more upon software. For these products and processes, reliability is a key success factor, and often a safety-critical hard requirement. It is well known and has often been experienced that quality cannot be added to software as a mere afterthought. This also holds for reliability. Moreover, the reliability of a system is not due to and cannot be built upon a single technology. A wide range of approaches is needed, the most difficult issue being their purposeful integration. Goals of reliability must be precisely defined and included in the requirements, the development process must be controlled to achieve these goals, and sound development methods must be used to fulfill these non-functional requirements.
Computers are gaining more and more control over systems that we use or rely on in our daily lives, privately as well as professionally. In safety-critical applications, as well as in others, it is of paramount importance that systems controled by a computer or computing systems themselves reliably behave in accordance with the specification and requirements, in other words: here correctness of the system, of its software and hardware is crucial. In order to cope with this callenge, software engineers and computer scientists need to understand the foundations of programming, how different formal theories are linked together, how compilers correctly translate high-level programs into machine code, and why transformations performed are justifiable. This book presents 17 mutually reviewed invited papers organized in sections on methodology, programming, automation, compilation, and application.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.