![]() |
Logic for Learning: Learning Comprehensible Theories from Structured Data
ISBN: 9783642075537 / Angielski / Miękka / 257 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book is concerned with the rich and fruitful interplay between the fields of computational logic and machine learning. The intended audience is senior undergraduates, graduate students, and researchers in either of those fields. For those in computational logic, no previous knowledge of machine learning is assumed and, for those in machine learning, no previous knowledge of computational logic is assumed. The logic used throughout the book is a higher-order one. Higher-order logic is already heavily used in some parts of computer science, for example, theoretical computer science,...
This book is concerned with the rich and fruitful interplay between the fields of computational logic and machine learning. The intended audience is s...
|
cena:
201,24 |
![]() |
Fundamentals of Computer Security
ISBN: 9783642077135 / Angielski / Miękka / 677 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key encryption, hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, and many others. The section on intrusion detection and access control provide examples of security systems implemented as a part of operating system....
This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer securi...
|
cena:
229,43 |
![]() |
Fuzzy Modeling and Control
ISBN: 9783790824865 / Angielski / Miękka / 728 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. In the last ten years, a true explosion of investigations into fuzzy modeling and its applications in control, diagnostics, decision making, optimization, pattern recognition, robotics, etc. has been observed. The attraction of fuzzy modeling results from its intelligibility and the high effectiveness of the models obtained. Owing to this the modeling can be applied for the solution of problems which could not be solved till now with any known conventional methods. The book provides the reader with an advanced introduction to the problems of fuzzy modeling and to one of its most important...
In the last ten years, a true explosion of investigations into fuzzy modeling and its applications in control, diagnostics, decision making, optimizat...
|
cena:
1207,67 |
![]() |
Similarity and Compatibility in Fuzzy Set Theory: Assessment and Applications
ISBN: 9783790825077 / Angielski / Miękka / 209 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Assessing the degree to which two objects, an object and a query, or two concepts are similar or compatible is a fundamental component of human reasoning and consequently is critical in the development of automated diagnosis, classification, information retrieval and decision systems. The assessment of similarity has played an important role in such diverse disciplines such as taxonomy, psychology, and the social sciences. Each discipline has proposed methods for quantifying similarity judgments suitable for its particular applications. This book presents a unified approach to quantifying...
Assessing the degree to which two objects, an object and a query, or two concepts are similar or compatible is a fundamental component of human reason...
|
cena:
402,53 |
![]() |
Advanced Fuzzy Systems Design and Applications
ISBN: 9783790825206 / Angielski / Miękka / 272 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Fuzzy rule systems have found a wide range of applications in many fields of science and technology. Traditionally, fuzzy rules are generated from human expert knowledge or human heuristics for relatively simple systems. In the last few years, data-driven fuzzy rule generation has been very active. Compared to heuristic fuzzy rules, fuzzy rules generated from data are able to extract more profound knowledge for more complex systems. This book presents a number of approaches to the generation of fuzzy rules from data, ranging from the direct fuzzy inference based to neural net- works and...
Fuzzy rule systems have found a wide range of applications in many fields of science and technology. Traditionally, fuzzy rules are generated from hum...
|
cena:
402,53 |
![]() |
State-of-the-Art in Content-Based Image and Video Retrieval
ISBN: 9789048158638 / Angielski / Miękka / 345 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Images and video play a crucial role in visual information systems and multimedia. There is an extraordinary number of applications of such systems in entertainment, business, art, engineering, and science. Such applications often involved large image and video collections, and therefore, searching for images and video in large collections is becoming an important operation. Because of the size of such databases, efficiency is crucial. We strongly believe that image and video retrieval need an integrated approach from fields such as image processing, shape processing, perception, database...
Images and video play a crucial role in visual information systems and multimedia. There is an extraordinary number of applications of such systems in...
|
cena:
402,53 |
![]() |
Personalized Digital Television: Targeting Programs to Individual Viewers
ISBN: 9789048166046 / Angielski / Miękka / 321 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. TV viewers today are exposed to overwhelming amounts of information, and challenged by the plethora of interactive functionality provided by current set-top boxes. To ensure broad adoption of this technology by consumers, future Digital Television will have to take usability issues thoroughly into account. In particular, serious attention must be paid to facilitate the selection of content on an individual basis, and to provide easy-to-use interfaces that satisfy viewers' interaction requirements. This volume collects selected research reports on the development of personalized... TV viewers today are exposed to overwhelming amounts of information, and challenged by the plethora of interactive functionality provided by curren... |
cena:
603,81 |
![]() |
Klassifikation mit Support Vektor Maschinen
ISBN: 9783640674275 / Niemiecki / Miękka / 86 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Diplomarbeit aus dem Jahr 1998 im Fachbereich Informatik - Theoretische Informatik, Note: 1,5, Universitat Ulm, Sprache: Deutsch, Abstract: Im Rahmen dieser Arbeit werden nichtlineare Support Vektor Maschinen im Bereich der Mehrklassen-Mustererkennung untersucht. Ein Punkt der Untersuchungen ist die Multiklassendiskriminierung durch Kombination binarer SV-Klassifikatoren. Diese Kombination kann durch paarweise Klassifikatoren und der Klassifikation, einer Klasse gegen alle anderen erreicht werden. Weiterhin wird untersucht, wie hochdimensionale Datensatze mit Standardsoftware fur quadratische...
Diplomarbeit aus dem Jahr 1998 im Fachbereich Informatik - Theoretische Informatik, Note: 1,5, Universitat Ulm, Sprache: Deutsch, Abstract: Im Rahmen ...
|
cena:
266,65 |
![]() |
Kryptografie in Theorie Und Praxis: Mathematische Grundlagen Für Internetsicherheit, Mobilfunk Und Elektronisches Geld
ISBN: 9783834809773 / Niemiecki / Miękka / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Kryptografie hat sich in jungster Zeit als eine Wissenschaft gezeigt, bei der mathematische Methoden mit besonderem Erfolg eingesetzt werden konnen. Das Buch stellt die gesamte Kryptografie unter diesem Aspekt vor: Grundlagen und Anwendungen, Verschlusselung und Authentifikation, symmetrische Algorithmen und Public-Key-Verfahren werden entsprechend ihrer Wichtigkeit prasentiert. Das Buch hat den Umfang einer 2-semestrigen Vorlesung, aufgrund seiner klaren Darstellung eignet es sich aber auch hervorragend zum Selbststudium. Zahlreiche Ubungsaufgaben von unterschiedlichem Schwierigkeitsgrad...
Kryptografie hat sich in jungster Zeit als eine Wissenschaft gezeigt, bei der mathematische Methoden mit besonderem Erfolg eingesetzt werden konnen. D...
|
cena:
188,08 |
![]() |
Komplexe Strukturen: Entropie Und Information
ISBN: 9783815430323 / Niemiecki / Twarda / 265 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Die Erforschung komplexer Strukturen ist gegenwartig eines der interessantesten wissenschaftlichen Themen. Dieses Buch behandelt Moglichkeiten der Beschreibung und quantitativen Charakterisierung komplexer Strukturen mit Hilfe verschiedener Entropie- und Informationsmae. Nach einer allgemein verstandlichen Einfuhrung der Grundbegriffe werden die fur eine quantitative Analyse erforderlichen Konzepte ausfuhrlich behandelt und an zahlreichen Beispielen, wie Zeitreihen, Biosequenzen, literarischen Texten und Musikstucken, veranschaulicht.
Die Erforschung komplexer Strukturen ist gegenwartig eines der interessantesten wissenschaftlichen Themen. Dieses Buch behandelt Moglichkeiten der Bes...
|
cena:
225,72 |
![]() |
Intelligent Data Interchange (IDI): Interventionsfreier Gesch?sdatenaustausch Durch Wissensrepräsentation Und Ontologisches Matching
ISBN: 9783834812926 / Niemiecki / Miękka / 397 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Andre Kohler entwickelt eine Architektur fur den intelligenten Geschaftsdatenaustausch (IDI), die es Unternehmen ermoglicht, strukturierte Geschaftsdokumente ad hoc und mit unbekannten Partnern austauschen zu konnen. Zentrale Bestandteile dieser Architektur sind Ontologien und semantische Matchingverfahren, die von sogenannten IDI-Agenten zur Interpretation von Geschaftsdokumenten sowie zur Protokollvereinbarung genutzt werden.
Andre Kohler entwickelt eine Architektur fur den intelligenten Geschaftsdatenaustausch (IDI), die es Unternehmen ermoglicht, strukturierte Geschaftsdo...
|
cena:
312,24 |
![]() |
Pairing-Based Cryptography - Pairing 2010: 4th International Conference, Yamanaka Hot Spring, Japan, December 13-15, 2010, Proceedings
ISBN: 9783642174544 / Angielski / Miękka / 467 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot Spring, Japan, in December 2010.The 25 full papers presented were carefully reviewed and selected from 64 submissions. The contributions are organized in topical sections on: efficient software implementation; digital signatures; cryptographic protocols; key agreement; applications - code generation, time-released encryption, and cloud computing; point encoding and pairing-friendly curves; ID-based encryption schemes; and efficient hardware,...
This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot S...
|
cena:
201,24 |
![]() |
The Codes of Life: The Rules of Macroevolution
ISBN: 9789048176113 / Angielski / Miękka / 440 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Building on a range of disciplines - from biology and anthropology to philosophy and linguistics - this book draws on the expertise of leading names in the study of organic, mental and cultural codes brought together by the emerging discipline of biosemiotics. The book's 18 chapters present a range of experimental evidence which suggests that the genetic code was only the first in a long series of organic codes, and that it has been the appearance of new codes - organic, mental and cultural - that paved the way for the major transitions in the history of life. While the... Building on a range of disciplines - from biology and anthropology to philosophy and linguistics - this book draws on the expertise of leading name... |
cena:
1006,38 |
![]() |
Cryptology and Network Security: 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings
ISBN: 9783642176180 / Angielski / Miękka / 355 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12-14, 2010. The conference was co-organized by the Multimedia University (MMU), Malaysia, and Universiti Tunku Abdul Rahman (UTAR), Malaysia. The conference received 64 submissions from 22 countries, out of which 21 were accepted after a careful and thorough review process. These proceedings also contain abstracts for two invited talks. All submissions were reviewed by at least three members of the Program Committee; those authored or co-authored by Program...
The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12-14, 2010. The co...
|
cena:
201,24 |
![]() |
Digital Watermarking: 9th International Workshop, Iwdw 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers
ISBN: 9783642184048 / Angielski / Miękka / 317 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held in Seoul, Korea, in October 2010. The 26 revised full papers presented were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on forensics, visual cryptography, robust watermarking, steganography, fingerprinting, and steganalysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th Interntaional Workshop on Digital Watermarking, IWDW 2010, held i...
|
cena:
201,24 |
![]() |
An Introduction to Mathematical Cryptography
ISBN: 9781441926746 / Angielski / Miękka / 524 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. ThecreationofpublickeycryptographybyDi?eandHellmanin1976andthe subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman in 1978 are watershed events in the long history of secret c- munications. It is hard to overestimate the importance of public key cr- tosystems and their associated digital signature schemes in the modern world of computers and the Internet. This book provides an introduction to the theory of public key cryptography and to the mathematical ideas underlying that theory. Public key cryptography draws on many areas of mathematics, including number...
ThecreationofpublickeycryptographybyDi?eandHellmanin1976andthe subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman ...
|
cena:
201,24 |
![]() |
Preferences and Similarities
ISBN: 9783211999417 / Angielski / Miękka / 320 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The fields of similarity and preference are still broadening due to the exploration of new fields of application. This is caused by the strong impact of vagueness, imprecision, uncertainty and dominance on human and agent information, communication, planning, decision, action, and control as well as by the technical progress of the information technology itself. The topics treated in this book are of interest to computer scientists, statisticians, operations researchers, experts in AI, cognitive psychologists and economists. The fields of similarity and preference are still broadening due to the exploration of new fields of application. This is caused by the strong impa... |
cena:
603,81 |
![]() |
Securing Emerging Wireless Systems: Lower-Layer Approaches
ISBN: 9781441946935 / Angielski / Miękka / 362 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a... Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the... |
cena:
402,53 |
![]() |
Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings
ISBN: 9783642101762 / Angielski / Miękka / 444 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a tradition for - formation security professionals around the world. SEC 2009 was organized by the Technical Committee 11 (TC-11) of IFIP, and took place in Pafos, Cyprus, during May 18-20, 2009. It is an indication of good fortune for a Chair to serve a conference that takes place in a country with the natural beauty of Cyprus, an island where the hospitality and frie- liness of the people have been going together, hand-in-hand, with its long...
It was an honor and a privilege to chair the 24th IFIP International Information Se- rity Conference (SEC 2009), a 24-year-old event that has become a...
|
cena:
402,53 |
![]() |
VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security
ISBN: 9783642096884 / Angielski / Miękka / 273 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts with better tools to discover patterns, detect anomalies, identify correlations, and communicate their findings. Visualization for computer security (VizSec) researchers and developers are doing just that. VizSec is about putting robust information visualization tools into the hands of human analysts to take advantage of the power of the human perceptual and cognitive processes in solving computer security problems. This volume... Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide secur... |
cena:
201,24 |