Account
Orders
Advanced search
Focuses on the process by which manually crafting interactive, hypertextual maps clarifies one’s own understanding, communicates it to others, and enables collective intelligence. The authors see mapping software as visual tools for reading and writing in a networked...
How do we design a self-organizing system? Is it possible to validate and control non-deterministic dynamics? What is the right balance between the emergent patterns that bring robustness, adaptability and scalability, and the traditional need for verification and...
Data mining essentially relies on several mathematical disciplines, many of which are presented in this second edition of this book. Topics include partially ordered sets, combinatorics, general topology, metric spaces, linear spaces, graph theory. To motivate the...
In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data,...
Economic Modeling Using Artificial Intelligence Methods examines the application of artificial intelligence methods to model economic data. Traditionally, economic modeling has been modeled in the linear domain where the principles of superposition are valid. The...
During the 21st century business environments have become more complex and dynamic than ever before. Companies operate in a world of change influenced by globalisation, volatile markets, legal changes and technical progress. As a result, they have to handle growing...
Meta-Programming and Model-Driven Meta-Program Development: Principles, Processes and Techniques presents an overall analysis of meta-programming, focusing on insights of meta-programming techniques, heterogeneous meta-program development processes in the context of...
Rough Set Theory, introduced by Pawlak in the early 1980s, has become an important part of soft computing within the last 25 years. However, much of the focus has been on the theoretical understanding ofRough Sets, with a survey ofRough Sets and their applications...
Militarized Conflict Modeling Using Computational Intelligence examines the application of computational intelligence methods to model conflict. Traditionally, conflict has been modeled using game theory. The inherent limitation of game theory when dealing with more...
Ontologies are increasingly recognized as essential tools in information science. Although the concepts are well understood theoretically , the practical implementation of ontologies remains challenging. In this book, researchers in computer science, information...
Optimization techniques have been widely adopted to implement various data mining algorithms. In addition to well-known Support Vector Machines (SVMs) (which are based on quadratic programming), different versions of Multiple Criteria Programming (MCP) have been...
Robot intelligence has become a major focus of intelligent robotics. Recent innovation in computational intelligence including fuzzy learning, neural networks, evolutionary computation and classical Artificial Intelligence provides sufficient theoretical and...
As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the...
The success of the World Wide Web depends on the ability of users to store, p- cess and retrieve digital information regardless of distance boundaries, languages and domains of knowledge.The universality and ?exibility of the World Wide Web have also enabled the rapid...
Dynamic Business Process Formation fuses practical needs with theoretical input to present important research innovations in supporting Instant Virtual Enterprises (IVEs). This new organization type brings a combination of business dynamism and explicit business process...
Multi-database mining has been recognized recently as an important and strategically essential area of research in data mining. In this book, we discuss various issues regarding the systematic and efficient development of multi-database mining applications. It explains...
Over the last decade researchers and practitioners have developed a wide range of knowledge related to e-learning. This book provides state-of-the-art e-learning networked environments and architectures carried out over the last few years from a knowledge management...
Web-based Support Systems (WSS) are an emerging multidisciplinary research area in which one studies the support of human activities with the Web as the common platform,mediumandinterface.TheInternetaffectseveryaspectofourmodernlife. Moving support systems to online is...
Information and communication technologies can provide new paradigms in healthcare provision. In particular, new Pervasive Healthcare technologies can revolutionise the dynamics of healthcare, enabling people to remain at home for longer, at lower costs to health and...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers