Account
Orders
Advanced search
The evolution of healthcare delivery systems has included an increased reliance on technology. There has been a significant shift in the nature of care prevention, diagnosis and treatment, which has decreased the importance of traditional methods of care delivery....
Advances in technology have resulted in new and advanced methods to support decision-making. For example, artificial intelligence has enabled people to make better decisions through the use of Intelligent Decision Support Systems (DSS). Emerging research in DSS...
Dependencies – directed labeled graph structures representing hierarchical relations between morphemes, words, and semantic units – are the standard representation in many fields of computational linguistics. The linguistic significance of these structures often remains...
The US, Europe, Japan and China are racing to develop the next generation of supercomputers – exascale machines capable of 10 to the 18th power calculations a second – by 2020. But the barriers are daunting: the challenge is to change the paradigm of high-performance...
The value of personal data has traditionally been understood in ethical terms as a safeguard for personality rights such as human dignity and privacy. However, we have entered an era where personal data are mined, traded and monetized in the process of creating added...
Secure Multi-Party Computation (MPC) is one of the most powerful tools developed by modern cryptography: it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades...
Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol...
In 2011 many computer users were exploring the opportunities and the benefits of the massive parallelism offered by heterogeneous computing.In 2000 the Khronos Group, a not-for-profit industry consortium, was founded to create standard open APIs for parallel computing,...
This book is a collection of the papers accepted for presentation at the 14th International Conference of the Catalan Association for Artificial Intelligence (CCIA 2011), held at the University of Lleida in October 2011. From the 28 papers submitted, 24 were accepted...
It is generally known that human faces, as well as body motions and gestures, provide a wealth of information about a person, such as age, race, sex and emotional state. This monograph primarily studies the perception of facial expression of emotion, and secondarily of...
The socio-technical gap is the great divide between social activities such as coordination which researchers and practitioners aim to support and those that are actually supported by technology. As the social interaction takes place through technology, it is changed and...
All political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage, and attacks on critical infrastructure can target decision makers, weapons systems, and citizens in general,...
As computers are increasingly embedded into our everyday environments, the objects therein become augmented with sensors, processing and communication capabilities and novel interfaces. The capability for objects to perceive the environment, store and process data,...
This publication covers papers presented at AIED2009, part of an ongoing series of biennial international conferences for top quality research in intelligent systems and cognitive science for educational computing applications. The conference provides opportunities for...
The demand for more computing power has been a constant trend in many fields of science, engineering and business. Now more than ever, the need for more and more processing power is emerging in the resolution of complex problems from life sciences, financial services,...
The topics of Advances in Information Technology and Communication in Health, the proceedings of ITCH 2009, include telemedicine and telehealth, electronic health records, software assurance and usability, terminology, classification and standards, software selection...
“Satisfiability (SAT) related topics have attracted researchers from various disciplines: logic, applied areas such as planning, scheduling, operations research and combinatorial optimization, but also theoretical issues on the theme of complexity and much more, they...
The real power for security applications will come from the synergy of academic and commercial research focusing on the specific issue of security. Special constraints apply to this domain, which are not always taken into consideration by academic research, but are...
The theme of this volume is the multi-faceted ‘computational turn’ that is occurring through the interaction of the disciplines of philosophy and computing. In computer and information sciences, there are significant conceptual and methodological questions that require...
Wireless sensor networks (WSN) are quickly gaining popularity in both military and civilian applications. However, WSN is especially vulnerable against external and internal attacks due to its particular characteristics. It is necessary to provide WSN with basic...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers