Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

One of the most mysterious areas of information security is industrial system security.
No other area of information security contains that many myths, mistakes, misconceptions
and outright lies. Information available online, while voluminous, will
only lead information security professionals and industrial systems
...

Multiobjective Genetic Algorithms for Clustering: Applications in Data Mining and Bioinformatics
Multiobjective Genetic Algorithms for Clustering: Applications in Data Mining and Bioinformatics

Clustering is an important unsupervised classification technique where a set of patterns, usually vectors in multidimensional space, are grouped into clusters based on some similarity or dissimilarity criteria. In crisp clustering, each pattern is assigned to exactly one cluster, whereas in fuzzy clustering, each pattern is given a...

Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms
Design and Analysis of Randomized Algorithms: Introduction to Design Paradigms

Randomization has become a standard approach in algorithm design. Efficiency and simplicity are the main features of randomized algorithms that often made randomization a miraculous springboard for solving complex problems in various applications. Especially in the areas of communication, cryptography, data management, and discrete...

Fuzzy Logic: A Spectrum of Theoretical & Practical Issues (Studies in Fuzziness and Soft Computing)
Fuzzy Logic: A Spectrum of Theoretical & Practical Issues (Studies in Fuzziness and Soft Computing)

This book exclusively surveys the active on-going research of the current maturity of fuzzy logic over the last four decades. Many world leaders of fuzzy logic have enthusiastically contributed their best research results into five theoretical, philosophical and fundamental sub areas and nine distinctive applications, including two PhD...

Recognizing Patterns in Signals, Speech, Images, and Videos: ICPR 2010 Contents
Recognizing Patterns in Signals, Speech, Images, and Videos: ICPR 2010 Contents

The 20th ICPR (International Conference on Pattern Recognition) Conference took place in Istanbul, Turkey, during August 23–26, 2010. For the first time in the ICPR history, several scientific contests (http://www.icpr2010.org/ contests.php) were organized in parallel to the conference main tracks. The purpose of these contests was to...

Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201

The RSA conference was initiated in 1991 and is a major international event for cryptography and information security researchers as well as the industry related to these disciplines. It is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the RSA conference has included...

Computational Linguistics and Intelligent Text Processing: 12th International Conference, CICLing 2011
Computational Linguistics and Intelligent Text Processing: 12th International Conference, CICLing 2011

CICLing 2011 was the 12th Annual Conference on Intelligent Text Processing and Computational Linguistics. The CICLing conferences provide a wide-scope forum for the discussion of the art and craft of natural language processing research as well as the best practices in its applications.

This set of two books contains four invited...

Architecture Principles: The Cornerstones of Enterprise Architecture (The Enterprise Engineering Series)
Architecture Principles: The Cornerstones of Enterprise Architecture (The Enterprise Engineering Series)

When enterprise architects try to explain to people who are not enterprise architects what it is they do for a living, they almost invariably resort to using an analogy with the architecture of buildings, and describe enterprise architecture as a ‘kind of blueprint’. While this analogy may be helpful in conveying a general sense...

Evolving Fuzzy Systems - Methodologies, Advanced Concepts and Applications
Evolving Fuzzy Systems - Methodologies, Advanced Concepts and Applications

In today’s real-world applications, there is an increasing demand of integrating new information and knowledge on-demand into model building processes to account for changing system dynamics, new operating conditions, varying human behaviors or environmental influences.

Evolving fuzzy systems (EFS) are a powerful tool...

Fuzzy Algorithms for Control (International Series in Intelligent Technologies)
Fuzzy Algorithms for Control (International Series in Intelligent Technologies)

Fuzzy Algorithms for Control gives an overview of the research results of a number of European research groups that are active and play a leading role in the field of fuzzy modeling and control. It contains 12 chapters divided into three parts.

Chapters in the first part address the position of fuzzy systems in control...

The Integrated Architecture Framework Explained: Why, What, How
The Integrated Architecture Framework Explained: Why, What, How

This book captures and communicates the wealth of architecture experience Capgemini has gathered as a member of The Open Group – a vendor- and technology-neutral consortium formed by major industry players – in developing, deploying, and using its “Integrated Architecture Framework” (IAF) since its origination in 1993....

Sanskrit Computational Linguistics: 4th International Symposium, New Delhi, India
Sanskrit Computational Linguistics: 4th International Symposium, New Delhi, India

This volume constitutes the refereed proceedings of the 4th International Symposium on Sanskrit Computational Linguistics, held in New Delhi, India, in December 2010. The 18 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers can be categorized under following broad areas such as phonology...

Result Page: 402 401 400 399 398 397 396 395 394 393 392 391 390 389 388 387 386 385 384 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy