Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Logics in Artificial Intelligence: 9th European Conference, JELIA 2004, Lisbon, Portugal, September 27-30, 2004
Logics in Artificial Intelligence: 9th European Conference, JELIA 2004, Lisbon, Portugal, September 27-30, 2004
This book constitutes the refereed proceedings of the 9th European Conference on Logics in Artificial Intelligence, JELIA 2004, held in Lisbon, Portugal, in September 2004.

The 52 revised full papers and 15 revised systems presentation papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from a...

Intelligent Information Processing and Web Mining: Proceedings of the International IIS: IIPWMВґ05 Conference held in Gdansk, Poland, June 13-16, 2005
Intelligent Information Processing and Web Mining: Proceedings of the International IIS: IIPWMВґ05 Conference held in Gdansk, Poland, June 13-16, 2005
This edited book contains articles accepted for presentation during the conference "Intelligent Information Systems 2005 (IIS 2005) - New Trends in Intelligent Information Processing and Web Mining" held in Gdansk, Poland, on June 13-16, 2005. Special attention is devoted to the newest developments in the areas of Artificial Immune...
Discovery Science: 7th International Conference, DS 2004, Padova, Italy, October 2-5, 2004. Proceedings (Lecture Notes in Computer Science)
Discovery Science: 7th International Conference, DS 2004, Padova, Italy, October 2-5, 2004. Proceedings (Lecture Notes in Computer Science)
This book constitutes the refereed proceedings of the 7th International Conference on Discovery Science, DS 2004, held in Padova, Italy in October 2004.

The 20 revised long papers and the 19 revised regular papers presented were carefully reviewed and selected from 80 submissions. The papers are organized in topical sections on pattern mining,...

Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems
Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems contains over 30 contributions from leading European researchers showing the present state and future directions of computer science research.

"Methods of Artificial Intelligence and Intelligent Agents" contains 13 contributions...

Computational Intelligence in Reliability Engineering (Studies in Computational Intelligence)
Computational Intelligence in Reliability Engineering (Studies in Computational Intelligence)
This two-volume book covers the recent applications of computational intelligence techniques in reliability engineering. Research in the area of computational intelligence is growing rapidly due to the many successful applications of these new techniques in very diverse problems. “Computational Intelligence” covers many fields such as...
Sensor Based Intelligent Robots: International Workshop, Dagstuhl Castle, Germany, October 15-20, 2000. Selected Revised Papers
Sensor Based Intelligent Robots: International Workshop, Dagstuhl Castle, Germany, October 15-20, 2000. Selected Revised Papers
This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Sensor Based Intelligent Robots held in Dagstuhl Castle, Germany, in October 2000.

The 20 revised full papers were carefully reviewed and improved for inclusion in this book. Addressing a broad variety of aspects of the highly
...
Scheduling Algorithms
Scheduling Algorithms
From the reviews of the fourth edition: 

"This is a book about scheduling algorithms. … The book contains eleven chapters. … Most of the chapters contain the summarized complexity results. In this edition the complexity columns have been updated. The book is completed by the bibliography which also has been updated and...

Rough Sets and Current Trends in Computing: 4th International Conference, RSCTC 2004, Uppsala, Sweden, June 1-5, 2004
Rough Sets and Current Trends in Computing: 4th International Conference, RSCTC 2004, Uppsala, Sweden, June 1-5, 2004
This book constitutes the refereed proceedings of the 4th International Conference on Rough Sets and Current Trends in Computing, RSCTC 2004, held in Uppsala, Sweden in June 2004.

The 45 revised full papers and 60 revised short papers presented together with 3 invited papers and a bibliographic project report were carefully reviewed and...

3D Imaging for Safety and Security (Computational Imaging and Vision)
3D Imaging for Safety and Security (Computational Imaging and Vision)
The past decades have seen significant improvements in 3D imaging where the related techniques and technologies have advanced to a mature state. These exciting developments have sparked increasing interest in industry and academia in the challenges and opportunities afforded by 3D sensing. As a consequence, the emerging area of safety and security...
Linear Genetic Programming (Genetic and Evolutionary Computation)
Linear Genetic Programming (Genetic and Evolutionary Computation)
Linear Genetic Programming presents a variant of genetic programming (GP) that evolves imperative computer programs as linear sequences of instructions, in contrast to the more traditional functional expressions or syntax trees. Primary characteristics of linear program structure are exploited to achieve acceleration of both execution time and...
Anti-Spam Measures: Analysis and Design
Anti-Spam Measures: Analysis and Design
The primary goal of this work is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. These determine to which extent the measures can contribute to the reduction of spam in the long run. The range of considered anti-spam measures includes legislative, organizational, behavioral and technological...
Test and Analysis of Web Services
Test and Analysis of Web Services
The service-oriented approach has become more and more popular, now allowing highly integrated and yet heterogeneous applications. Web services are the natural evolution of conventional middleware technologies to support Web-based and enterprise-level integration.

The highly dynamic characteristics of service-oriented applications means...

Result Page: 407 406 405 404 403 402 401 400 399 398 397 396 395 394 393 392 391 390 389 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy