Optimization is an extremely important area in science and technology which provides
powerful and useful tools and techniques for the formulation and solution of
a multitude of problems in which we wish, or need, to find a best possible option
or solution. It has been an important area of research for more than half a century,...
Nowadays most of the systems are computer controlled among them we quote
mechatronic systems where the intelligence is implemented in microcontrollers. The
discipline that deals with such systems is mechatronics that we define as the synergistic
combination of mechanical engineering, electronic engineering, and software...
The objective of this book is to give an introduction to the software process improvement
field to computer science students. The well-known Capability Maturity Model Integration
(CMMI1) is used as the vehicle for software process improvement as it has become the
de facto standard2 for implementing best practice in software...
Everyday people need to make decisions, and the decision makers usually face multiple,
conflicting objectives and uncertain environments. The research about uncertain
multi-objective decision making problems has been profolic. It mainly provides
decision makers with the help to find optimal solutions for many objectives under...
These proceedings contain the papers presented at the 8th Internationl Symposium
on Automated Technology for Verification and Analysis held during
September 21–24, 2010 in Singapore. The primary objective of the ATVA conferences
remains the same: to exchange and promote the latest advances of
state-of-the-art research on...
We describe in this book, hybrid intelligent systems using type-2 fuzzy logic and
modular neural networks for pattern recognition applications. Hybrid intelligent
systems combine several intelligent computing paradigms, including fuzzy logic,
neural networks, and bio-inspired optimization algorithms, which can be used to
Cryptography is a key technology in electronic security systems.
Modern cryptograpic techniques have many uses, such as to digitally
sign documents, for access control, to implement electronic money,
and for copyright protection. Because of these important uses it is
necessary that users be able to estimate the efficiency and security...
With ever increasing frequency, financial studies in business are acquiring greater importance in the field of management as a consequence of the complexity of the problems arising in present day society. The old treaties that included certain aspects on the raising and placing of payment means have been relegated to history, leaving the way...
This volume contains the proceedings of the 6th International Conference on
Logical Aspects of Computational Linguistics 2011 (LACL 2011), held June 29-
July 1, 2011 in Montpellier, France. The LACL conferences aim at providing a
forum for the presentation and discussion of current research in all the formal
and logical aspects of...
Steganography and steganalysis, the hiding and detection of a covert payload
within an innocent cover object, started to receive attention from the computer
science, engineering, and mathematics communities in the 1990s. At
first the problems were not clearly defined, but proper statistical foundations
were proposed and mathematical...
IBWAS 2009, the Iberic Conference on Web Applications Security, was the first
international conference organized by both the OWASP Portuguese and Spanish chapters
in order to join the international Web application security academic and industry
communities to present and discuss the major aspects of Web applications security.
Sequencing and scheduling is a formof decision-making that plays a crucial role in manufacturing and service industries. In the current competitive environment effective sequencing and scheduling has become a necessity for survival in the market-place. Companies have to meet shipping dates that have been committed to customers, as failure to...