 |
|
 |  |  |  |  Hybrid Methods in Pattern RecognitionThe discipline of pattern recognition has seen enormous progress since its beginnings more than four decades ago. Over the years various approaches have emerged, based on statistical decision theory, structural matching and parsing, neural networks, fuzzy logic, artificial intelligence, evolutionary computing, and others. Obviously, these... |
|
 Linkage in Evolutionary Computation (Studies in Computational Intelligence)In recent years, the issue of linkage in GEAs has garnered greater attention and recognition from researchers. Conventional approaches that rely much on ad hoc tweaking of parameters to control the search by balancing the level of exploitation and exploration are grossly inadequate. As shown in the work reported here, such parameters tweaking based... |  |  Metaphors For God's Time in Science and ReligionMetaphors for God's Time in Science and Religion examines the exploratory work of metaphors for time in astrophysical cosmology, chaos theory, evolutionary biology and neuroscience. Stephen Happel claims that the Christian God is intimately involved at every level of physical and biological science. He compares how scientists and... |  |  Interoperability of Enterprise Software and ApplicationsInteroperability: the ability of a system or a product to work with other systems or products without special effort from the user is a key issue in manufacturing and industrial enterprise generally. It is fundamental to the production of goods and services quickly and at low cost at the same time as maintaining levels of quality and customisation.... |
|
 Optical Switching NetworksOptical Switching Networks describes all the major switching paradigms developed for modern optical networks, discussing their operation, advantages, disadvantages and implementation. Following a review of the evolution of optical WDM networks, an overview of the future trends out. The latest developments in optical access, local, metropolitan, and... |  |  |  |  Malware Forensics: Investigating and Analyzing Malicious Code
Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and... |
|
 |  |  IP Multimedia Subsystem (IMS) HandbookThe IP multimedia subsystem (IMS), established as the foundation for future wireless and wireline convergence, is the bedrock that will facilitate easy deployment on new, rich, personalized multimedia communication services that mix telecom and data services. Designers, planners, and researchers of communication systems will need to make full use... |  |  |
|
| Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 |