You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
It is our pleasure to provide you with the volume containing the proceedings of the 5th International Conference on Parallel Processing and Applied Mathe- tics, which was held in Cz ̧ estochowa, a Polish city famous for its Jasna Gora Monastery, on September 7–10, 2003. The ?rst PPAM conference was held in 1994 and was organized by the Institute of Mathematics and Computer Science of the Cz ̧ estochowa University of Technology in its hometown. The main idea behind the event was to provide a forum for researchers involved in applied and computational mathematics and parallel computing to exchange ideas in a relaxed atmosphere. Conference organizers hoped that this arrangement would result...
The book is a collection of invited papers on Computational Intelligence for Privacy and Security. The majority of the chapters are extended versions of works presented at the special session on Computational Intelligence for Privacy and Security of the International Joint Conference on Neural Networks (IJCNN-2010) held July 2010 in Barcelona, Spain. The book is devoted to Computational Intelligence for Privacy and Security. It provides an overview of the most recent advances on the Computational Intelligence techniques being developed for Privacy and Security. The book will be of interest to researchers in industry and academics and to post-graduate students interested in the latest advances and developments in the field of Computational Intelligence for Privacy and Security.
Optimization problems were and still are the focus of mathematics from antiquity to the present. Since the beginning of our civilization, the human race has had to confront numerous technological challenges, such as finding the optimal solution of various problems including control technologies, power sources construction, applications in economy, mechanical engineering and energy distribution amongst others. These examples encompass both ancient as well as modern technologies like the first electrical energy distribution network in USA etc. Some of the key principles formulated in the middle ages were done by Johannes Kepler (Problem of the wine barrels), Johan Bernoulli (brachystochrone pr...
The set LNCS 2723 and LNCS 2724 constitutes the refereed proceedings of the Genetic and Evolutionary Computation Conference, GECCO 2003, held in Chicago, IL, USA in July 2003. The 193 revised full papers and 93 poster papers presented were carefully reviewed and selected from a total of 417 submissions. The papers are organized in topical sections on a-life adaptive behavior, agents, and ant colony optimization; artificial immune systems; coevolution; DNA, molecular, and quantum computing; evolvable hardware; evolutionary robotics; evolution strategies and evolutionary programming; evolutionary sheduling routing; genetic algorithms; genetic programming; learning classifier systems; real-world applications; and search based software engineering.
The newest volume in this series presents refereed papers in the following categories and their applications in the engineering domain: Neural Networks; Complex Networks; Evolutionary Programming; Data Mining; Fuzzy Logic; Adaptive Control; Pattern Recognition; Smart Engineering System Design. These papers are intended to provide a forum for researchers in the field to exchange ideas on smart engineering system design.
Proceedings Annie Conference, November 2006, St. Louis, Missouri. The newest volume in this series presents refereed papers in the following categories and their applications in the engineering domain: Neural Networks; Complex Networks; Evolutionary Programming; Data Mining; Fuzzy Logic; Adaptive Control; Pattern Recognition; Smart Engineering System Design. These papers are intended to provide a forum for researchers in the field to exchange ideas on smart engineering system design.
"I'm a human sponge - I soak up memories. I feel like a thief, stealing secrets with an innocent touch. I don't like this gift. It's intrusive and sneaky. I think it's harmless, but I can't be sure. If knowledge is power, why do I feel so alone...'" The apocalypse came and the world burned. But it wasn't the end, and out of the destruction, new life has emerged. Bec is back to face the Demonata. After centuries of imprisonment, she's more powerful than ever, but the demons no longer stand alone. Something else has crawled out of the darkness with her. Lord Loss is no longer humanity's greatest threat...
This volume draws attention to many specific challenges of multilingual processing within the European Union, especially after the recent successive enlargement. Most of the languages considered herein are not only â ~less resourcedâ (TM) in terms of processing tools and training data, but also have features which are different from the well known international language pairs. The 16 contributions address specific problems and solutions for languages from south-eastern and central Europe in the context of multilingual communication, translation and information retrieval.