This book constitutes the refereed proceedings of the Third International Conference on Advances in Visual Informatics, IVIC 2013, held in Selangor, Malaysia, in November 2013. The four keynotes and 69 papers presente...
详细信息
ISBN:
(数字)9783319029580
ISBN:
(纸本)9783319029573
This book constitutes the refereed proceedings of the Third International Conference on Advances in Visual Informatics, IVIC 2013, held in Selangor, Malaysia, in November 2013. The four keynotes and 69 papers presented were carefully reviewed and selected from various submissions. The papers focus on four tracks: computer visions and engineering; computer graphics and simulation; virtual and augmented reality; and visualization and social computing.
This book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), held in Kraków, Poland, September 5-7, 2006. The conference continues f...
详细信息
ISBN:
(数字)9783540377528
ISBN:
(纸本)9783540377504
This book presents the proceedings of the Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), held in Kraków, Poland, September 5-7, 2006. The conference continues from previous events held in Zaragoza (2004) and Copenhagen (2005), and maintains the aim of bringing together academic researchers and industry developers to discuss the state of the art in technology for establishing trust, privacy and security in digital business. We thank the attendees for coming to Kraków to participate and debate the new emerging advances in this area. The conference programme included two keynote presentations, one panel session and eight technical papers sessions. The keynote speeches were delivered by Jeremy Ward from Symantec EMEA on the topic of “Building the Information Assurance Community of Purpose”, and by Günter Karjoth from IBM Research - Zurich, with a talk entitled “Privacy Practices and Economics –– From Privacy Policies to Privacy SLAs. ” The subject of the panel discussion was “Is Security Without Trust Feasible?” chaired by Leszek T. Lilien from Western Michigan University, USA. The reviewed paper sessions covered a broad range of topics, from access control models to security and risk management, and from privacy and identity management to security protocols. The conference attracted 70 submissions, each of which was assigned to four referees for review. The Programme Committee ultimately accepted 24 papers for inclusion, which were revised based upon comments from their reviews.
This book constitutes the refereed proceedings of the International Conference on the Applications of Evolutionary Computation, EvoApplications 2012, held in Málaga, Spain, in April 2012, colocated with the Evo* ...
详细信息
ISBN:
(数字)9783642291784
ISBN:
(纸本)9783642291777
This book constitutes the refereed proceedings of the International Conference on the Applications of Evolutionary Computation, EvoApplications 2012, held in Málaga, Spain, in April 2012, colocated with the Evo* 2012 events EuroGP, EvoCOP, EvoBIO, and EvoMUSART. The 54 revised full papers presented were carefully reviewed and selected from 90 submissions. EvoApplications 2012 consisted of the following 11 tracks: EvoCOMNET (nature-inspired techniques for telecommunication networks and other parrallel and distributed systems), EvoCOMPLEX (algorithms and complex systems), EvoFIN (evolutionary and natural computation in finance and economics), EvoGAMES (bio-inspired algorithms in games), EvoHOT (bio-inspired heuristics for design automation), EvoIASP (evolutionary computation in image analysis and signal processing), EvoNUM (bio-inspired algorithms for continuous parameter optimization), EvoPAR (parallel implementation of evolutionary algorithms), EvoRISK (computational intelligence for risk management, security and defense applications), EvoSTIM (nature-inspired techniques in scheduling, planning, and timetabling), and EvoSTOC (evolutionary algorithms in stochastic and dynamic environments).
This book constitutes thoroughly refereed post-conference proceedings ofthe workshops of the 17th International Conference on Parallelcomputing, Euro-Par 2011, held in Bordeaux, France, in August 2011.The papers of th...
详细信息
ISBN:
(数字)9783642297403
ISBN:
(纸本)9783642297397
This book constitutes thoroughly refereed post-conference proceedings of
the workshops of the 17th International Conference on Parallel
computing, Euro-Par 2011, held in Bordeaux, France, in August 2011.
The papers of these 12 workshops CCPI, CGWS, HeteroPar, HiBB, HPCVirt, HPPC, HPSS
HPCF, PROPER, CCPI, and VHPC focus on promotion and advancement of all
aspects of parallel and distributed computing.
This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students and practitioners a unique update on the latest advances in theory, together with a wealth of appl...
详细信息
ISBN:
(数字)9783030054113
ISBN:
(纸本)9783030054106
This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students and practitioners a unique update on the latest advances in theory, together with a wealth of applications. It presents the peer-reviewed proceedings of the VII International Conference on Complex Networks and their Applications (COMPLEX NETWORKS 2018), which was held in Cambridge on December 11–13, 2018. The carefully selected papers cover a wide range of theoretical topics such as network models and measures; community structure and network dynamics; diffusion, epidemics and spreading processes; and resilience and control; as well as all the main network applications, including social and political networks; networks in finance and economics; biological and neuroscience networks; and technological networks.
This book features high-quality research papers presented at the 4th International Conference on Advanced computing and Intelligent Engineering (ICACIE 2019), Department of computerscience, Rama Devi Women’s Univers...
详细信息
ISBN:
(数字)9789811565847
ISBN:
(纸本)9789811565830
This book features high-quality research papers presented at the 4th International Conference on Advanced computing and Intelligent Engineering (ICACIE 2019), Department of computerscience, Rama Devi Women’s University, Bhubaneswar, Odisha, India. It includes sections describing technical advances and contemporary research in the fields of advanced computing and intelligent engineering, which are based on the presented articles. Intended for postgraduate students and researchers working in the discipline of computerscience and engineering, the book also appeals to researchers in the domain of electronics as it covers hardware technologies and future communication technologies.
After two decades, data processing has finally, and probably forever, found its niche among civil engineering and construction (CEC) professionnals, through word processors, digitizing tables, management software, and...
详细信息
ISBN:
(数字)9781468474046
ISBN:
(纸本)9781850912538
After two decades, data processing has finally, and probably forever, found its niche among civil engineering and construction (CEC) professionnals, through word processors, digitizing tables, management software, and increasingly via drawing software and computer-aided design (CAD), recently, robots have even started invading work sites. What are the main trends of CAD and robotics in the field of architecture and civil enginee ring? What type of R&D effort do university and industrial laboratories undertake to devise the professional software that will be on the market in the next three to five years? These are the issues which will be addressed during this symposium. To this effect, we have planned concurrently an equipment and software show, as well as a twofold conference. Robotic is just starting in the field of civil engineering and construction. A pioneer, the Civil Engineering Departement of Carnegie-Mellon University, in the United States, organized the first two international symposia, in 1984 and 1985 in Pittsburgh. This is the third meeting on the subject (this year, however, we have also included CAD). It constitutes the first large international symposium where CAD experts, specialists in architecture and CEC robotics will meet. From this standpoint, it should be an ideal forum for exchanging views and expe riences on a wide range of topics, and we hope it will give rise to novel applications and new syntheses. This symposium is intented for scientists, teachers, students and also for manufacturers and all CEC professionals.
The goal of this book is to explore various security paradigms such as Machine Learning, Big data, Cyber Physical systems, and Blockchain to address both intelligence and reconfigurability in various IoT devices. The ...
详细信息
ISBN:
(数字)9783031319525
ISBN:
(纸本)9783031319518;9783031319549
The goal of this book is to explore various security paradigms such as Machine Learning, Big data, Cyber Physical systems, and Blockchain to address both intelligence and reconfigurability in various IoT devices. The book further aims to address and analyze the state of the art of blockchain-based intelligent networks in IoT systems and related technologies including healthcare sector. AI can ease, optimize, and automate the blockchain-based decision-making process for better governance and higher performance in IoT systems. Considering the incredible progress made by AI models, a blockchain system powered by intelligent AI algorithms can detect the existence of any kind of attack and automatically invoke the required defense mechanisms. In case of unavoidable damage, AI models can help to isolate the compromised component from the blockchain platform and safeguard the overall system from crashing. Furthermore, AI models can also contribute toward the robustness and scalability of blockchain-based intelligent IoT networks. The book is designed to be the first-choice reference at university libraries, academic institutions, research and development centers, information technology centers, and any institutions interested in integration of AI and IoT. The intended audience of this book include UG/PG students, Ph.D. scholars of this fields, industry technologists, young entrepreneurs, professionals, network designers, data scientists, technology specialists, practitioners, and people who are interested in exploring the role of AI and blockchain technology in IoT systems.
Nowadays, research on session-based recommender systems (SRSs) is one of the hot spots in the recommendation domain. Existing methods make recommendations based on the user’s current intention (also called short-term...
详细信息
Nowadays, research on session-based recommender systems (SRSs) is one of the hot spots in the recommendation domain. Existing methods make recommendations based on the user’s current intention (also called short-term preference) during a session, often overlooking the specific preferences associated with these intentions. In reality, users usually exhibit diverse preferences for different intentions, and even for the same intention, individual preferences can vary significantly between users. As users interact with items throughout a session, their intentions can shift accordingly. To enhance recommendation quality, it is crucial not only to consider the user’s intentions but also to dynamically learn their varying preferences as these intentions change. In this paper, we propose a novel Intention-sensitive Preference Learning Network (IPLN) including three main modules: intention recognizer, preference detector, and prediction layer. Specifically, the intention recognizer infers the user’s underlying intention within his/her current session by analyzing complex relationships among items. Based on the acquired intention, the preference detector learns the intention-specific preference by selectively integrating latent features from items in the user’s historical sessions. Besides, the user’s general preference is utilized to refine the obtained preference to reduce the potential noise carried from historical records. Ultimately, the fine-tuned preference and intention collaborate to instruct the next-item recommendation in the prediction layer. To prove the effectiveness of the proposed IPLN, we perform extensive experiments on two real-world datasets. The experiment results demonstrate the superiority of IPLN compared with other state-of-the-art models.
暂无评论