Home | Amazing | Today | Tags | Publishers | Years | Search 
Agent and Multi-agent Technology for Internet and Enterprise Systems (Studies in Computational Intelligence)
Agent and Multi-agent Technology for Internet and Enterprise Systems (Studies in Computational Intelligence)

Research in multi-agent systems offers a promising technology for problems with networks, online trading and negotiations but also social structures and communication. This is a book on agent and multi-agent technology for internet and enterprise systems. The book is a pioneer in the combination of the fields and is based on the concept of...

Microwave Circuits for 24 GHz Automotive Radar in Silicon-based Technologies
Microwave Circuits for 24 GHz Automotive Radar in Silicon-based Technologies

There are continuous efforts focussed on improving road traffic safety worldwide. Numerous vehicle safety features such as driver assistance systems have been invented. Many driver assistance features rely on radar-based sensors, but are highly-priced. Realization of low-cost radar front-end circuits would enable their implementation in less...

Model-Based Software Performance Analysis
Model-Based Software Performance Analysis

In the last decade there has been a growing interest in the research and software industry communities toward techniques, methods and tools that allow one to manage system performance concerns in the software developer domain. Poor performance can often be the cause of software project failure, and the need to address performance...

Software Business: First International Conference, ICSOB 2010
Software Business: First International Conference, ICSOB 2010

This book contains the refereed proceedings of the First International Conference on Software Business (ICSOB) in Jyväskylä, Finland, in June 2010. This inaugural conference brought together a strong international community from 17 countries from the Americas, Europe, India and Australia with research disciplines from various fields...

Fuzzy Optimization: Recent Advances and Applications (Studies in Fuzziness and Soft Computing)
Fuzzy Optimization: Recent Advances and Applications (Studies in Fuzziness and Soft Computing)
Optimization is an extremely important area in science and technology which provides powerful and useful tools and techniques for the formulation and solution of a multitude of problems in which we wish, or need, to find a best possible option or solution. It has been an important area of research for more than half a century,...
Uncertainty Theory: A Branch of Mathematics for Modeling Human Uncertainty (Studies in Computational Intelligence)
Uncertainty Theory: A Branch of Mathematics for Modeling Human Uncertainty (Studies in Computational Intelligence)
Some information and knowledge are usually represented by human language like “about 100km”, “approximately 39 ?C”, “roughly 80kg”, “low speed”, “middle age”, and “big size”. Perhaps some people think that they are subjective probability or they are fuzziness....
Soft Computing in XML Data Management: Intelligent Systems from Decision Making to Data Mining
Soft Computing in XML Data Management: Intelligent Systems from Decision Making to Data Mining

Being the de-facto standard for data representation and exchange over the Web, XML (Extensible Markup Language) allows the easy development of applications that exchange data over the Web. This creates a set of data management requirements involving XML. XML and related standards have been extensively applied in many business, service, and...

The Gaussian Approximation Potential: An Interatomic Potential Derived from First Principles Quantum Mechanics (Springer Theses)
The Gaussian Approximation Potential: An Interatomic Potential Derived from First Principles Quantum Mechanics (Springer Theses)

Simulation of materials at the atomistic level is an important tool in studying microscopic structures and processes. The atomic interactions necessary for the simulations are correctly described by Quantum Mechanics, but the size of systems and the length of processes that can be modelled are still limited. The framework of Gaussian...

Learning to Rank for Information Retrieval
Learning to Rank for Information Retrieval

Due to the fast growth of the Web and the difficulties in finding desired information, efficient and effective information retrieval systems have become more important than ever, and the search engine has become an essential tool for many people.

The ranker, a central component in every search engine, is responsible for the...

Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)
Efficient Secure Two-Party Protocols: Techniques and Constructions (Information Security and Cryptography)

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing efficient protocols and proving them...

Advanced Statistical Steganalysis (Information Security and Cryptography)
Advanced Statistical Steganalysis (Information Security and Cryptography)

Steganography and steganalysis, the hiding and detection of a covert payload within an innocent cover object, started to receive attention from the computer science, engineering, and mathematics communities in the 1990s. At first the problems were not clearly defined, but proper statistical foundations were proposed and mathematical...

Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)
Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time....

Result Page: Previous 3274 3275 3276 3277 3278 3279 3280 3281 3282 3283 3284 3285 3286 3287 3288 3289 3290 3291 3292 3293 3294 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy