The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee and un...
ISBN:
(数字)9783031196089
ISBN:
(纸本)9783031196072;9783031196102
The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee and underwent further rigorous rounds of review. From this second round of review, 15 of the conference’s most promising papers are then published in this Springer (SCI) book and not the conference proceedings. We impatiently await the important contributions that we know these authors will bring to the field of computer and information science.
Multimedia services involve processing, transmission and retrieval of multiple forms of information. Multimedia services have gained momentum in the past few years due to the easy availability of computing power and s...
ISBN:
(数字)9783540785026
ISBN:
(纸本)9783540784913;9783642097249
Multimedia services involve processing, transmission and retrieval of multiple forms of information. Multimedia services have gained momentum in the past few years due to the easy availability of computing power and storage media. Societyisdemandinghuman-likeintelligentbehaviour,suchasadaptationand generalization, from machines every day. With this view in mind, researchers are working on fusing intelligent paradigms such as arti?cial neural networks, swarm intelligence, arti?cial immune systems, evolutionary computing and multiagents with multimedia services. Arti?cial neural networks use neurons, interconnected using various schemes, for fusing learning in multimedia-based systems. Evolutionary c- puting techniques are used in tasks such as optimization. Typical multiagent systems are based on Belief-Desire-Intention model and act on behalf of the users. Typical examples of intelligent multimedia services include digital - braries, e-learning and teaching, e-government, e-commerce, e-entertainment, e-health and e-legal services. This book includes 15 chapters on advanced tools and methodologies pertaining to the multimedia services. The authors and reviewers have c- tributed immensely to this research-oriented book. We believe that this - search volume will be valuable to professors, researchers and students of all disciplines, such as computer science, engineering and management. We express our sincere thanks to Springer-Verlag for their wonderful e- torial support.
This book highlights cutting-edge research in network science, offering scientists, researchers, students, and practitioners a unique update on the latest advances in theory and a multitude of applications. It present...
ISBN:
(数字)9783031824319
ISBN:
(纸本)9783031824302;9783031824333
This book highlights cutting-edge research in network science, offering scientists, researchers, students, and practitioners a unique update on the latest advances in theory and a multitude of applications. It presents the peer-reviewed proceedings of the XIII International Conference on Complex Networks and their Applications (COMPLEX NETWORKS 2024). The carefully selected papers cover a wide range of theoretical topics such as network embedding and network geometry; community structure, network dynamics; diffusion, epidemics, and spreading processes; machine learning and graph neural networks, as well as all the main network applications, including social and political networks; networks in finance and economics; biological networks and technological networks.
The book discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware security applications, in particular the techniques of launching potent "model...
ISBN:
(数字)9789811940170
ISBN:
(纸本)9789811940163;9789811940194
The book discusses a broad overview of traditional machine learning methods and state-of-the-art deep learning practices for hardware security applications, in particular the techniques of launching potent "modeling attacks" on Physically Unclonable Function (PUF) circuits, which are promising hardware security primitives. The volume is self-contained and includes a comprehensive background on PUF circuits, and the necessary mathematical foundation of traditional and advanced machine learning techniques such as support vector machines, logistic regression, neural networks, and deep learning. This book can be used as a self-learning resource for researchers and practitioners of hardware security, and will also be suitable for graduate-level courses on hardware security and application of machine learning in hardware security. A stand-out feature of the book is the availability of reference software code and datasets to replicate the experiments described in the book.
暂无评论