Information Security Applications: 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007This book constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, August 27-29, 2007.
The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical... | | Introduction to Embedded Systems: A Cyber-Physical Systems Approach
The most visible use of computers and software is processing information for human
consumption. We use them to write books (like this one), search for information
on the web, communicate via email, and keep track of financial data. The vast
majority of computers in use, however, are much less visible. They run the engine,
brakes,... | | Bayesian Networks and Influence Diagrams: A Guide to Construction and Analysis (Information Science and Statistics)Probabilistic networks, also known as Bayesian networks and influence diagrams, have become one of the most promising technologies in the area of applied artificial intelligence, offering intuitive, efficient, and reliable methods for diagnosis, prediction, decision making, classification, troubleshooting, and data mining under uncertainty.... |
|