Home | Amazing | Today | Tags | Publishers | Years | Search 
Logic-Based Artificial Intelligence
Logic-Based Artificial Intelligence

This landmark volume represents the culmination of over 40 years of research in the use of logic as a basis for representing and manipulating problems in the field of artificial intelligence. The use of logic as a basis for commonsense reasoning was started by John McCarthy in 1959. The collection consists of both original research and...

Modelling Systems: Practical Tools and Techniques in Software Development
Modelling Systems: Practical Tools and Techniques in Software Development

For developers of computer-based systems, capturing and understanding the complex functional requirements and behaviour of software components has come to represent a considerable challenge. This book aims to equip readers with skills and techniques which will help them to address this challenge. It does so by stressing the value of...

Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)
Human Computation (Synthesis Lectures on Artificial Intelligence and Machine Learning)

Human computation is a new and evolving research area that centers around harnessing human intelligence to solve computational problems that are beyond the scope of existing Artificial Intelligence (AI) algorithms. With the growth of the Web, human computation systems can now leverage the abilities of an unprecedented number of people via the...

Business Information Systems: 14th International Conference, BIS 2011, Pozna, Poland
Business Information Systems: 14th International Conference, BIS 2011, Pozna, Poland

BIS 2011 held in Pozna´n, Poland, was the 14th in a series of international conferences on business information systems. The BIS conference series has been recognized by professionals from the very beginning as a forum for the exchange and dissemination of topical research in the development, implementation, application and...

Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

First-Order Dynamic Logic (Lecture Notes in Computer Science)
First-Order Dynamic Logic (Lecture Notes in Computer Science)

This is a research monograph intended primarily for those researchers in Theoretical Computer Science interested in the areas of logics of programs, programming language semantics and program verification. It is also aimed at mathematically-inclined researchers in Logic, Linguistics and Philosophy, interested in a well-motivated...

Reliable Software Technologies - Ada-Europe 2011: 16th Ada-Europe International Conference on Reliable Software Technologies
Reliable Software Technologies - Ada-Europe 2011: 16th Ada-Europe International Conference on Reliable Software Technologies

The 16th edition of the International Conference on Reliable Software Technologies – Ada-Europe 2011—took place in the John McIntyre Conference Centre, Edinburgh (UK). Previous editions of the conference were held in Switzerland (Montreux 1996 and Geneva 2007), United Kingdom (London 1997 and York 2005), Sweden (Uppsala...

Verilog Designer's Library
Verilog Designer's Library

Ready-to-use building blocks for integrated circuit design.

 

Why start coding from scratch when you can work from this library of pre-tested routines, created by an HDL expert? There are plenty of introductory texts to describe...

Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011
Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011

FASE (Fundamental Approaches to Software Engineering) is concerned with the foundations on which software engineering is built. Its focus is on novel techniques and the way in which they contribute to making software engineering a more mature and soundly based discipline. This year, we particularly encouraged contributions that combine the...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Software Reliability Methods (Texts in Computer Science)
Software Reliability Methods (Texts in Computer Science)

This book presents current methods for dealing with software reliability, illustrating the advantages and disadvantages of each method. The description of the techniques is intended for a non-expert audience with some minimal technical background. It also describes some advanced techniques, aimed at researchers and practitioners in software...

Structural Failure Models for Fault-Tolerant Distributed Computing (Software Engineering Research)
Structural Failure Models for Fault-Tolerant Distributed Computing (Software Engineering Research)

Despite means of fault prevention such as extensive testing or formal verification, errors inevitably occur during system operation. To avoid subsequent system failures, critical distributed systems, therefore, require engineering of means for fault tolerance. Achieving fault tolerance requires some redundancy, which, unfortunately,...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy