You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed post-conference proceedings on Learning and Intelligent Optimization, LION 15, held in Athens, Greece, in June 2021. The 30 full papers presented have been carefully reviewed and selected from 35 submissions. LION deals with designing and engineering ways of "learning" about the performance of different techniques, and ways of using past experience about the algorithm behavior to improve performance in the future. Intelligent learning schemes for mining the knowledge obtained online or offline can improve the algorithm design process and simplify the applications of high-performance optimization methods. Combinations of different algorithms can further improve the robustness and performance of the individual components.
This book constitutes the refereed proceedings of the Third International Conference on Algebraic Informatics, CAI 2009, held in Thessaloniki, Greece, in May 2009. The 16 full papers were carefully reviewed and selected from 25 submissions. The papers cover topics such as algebraic semantics on graph and trees, formal power series, syntactic objects, algebraic picture processing, finite and infinite computations, acceptors and transducers for strings, trees, graphs arrays, etc. decision problems, algebraic characterization of logical theories, process algebra, algebraic algorithms, algebraic coding theory, algebraic aspects of cryptography.
This book constitutes the refereed post-conference proceedings on Learning and Intelligent Optimization, LION 14, held in Athens, Greece, in May 2020. The 37 full papers presented together with one invited paper have been carefully reviewed and selected from 75 submissions. LION deals with designing and engineering ways of "learning" about the performance of different techniques, and ways of using past experience about the algorithm behavior to improve performance in the future. Intelligent learning schemes for mining the knowledge obtained online or offline can improve the algorithm design process and simplify the applications of high-performance optimization methods. Combinations of different algorithms can further improve the robustness and performance of the individual components. Due to the COVID-19 pandemic, LION 14 was not held as a physical meeting.
This book constitutes the refereed post-conference proceedings of the Special Event on the Analysis of Experimental Algorithms, SEA2 2019, held in Kalamata, Greece, in June 2019. The 35 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers cover a wide range of topics in both computer science and operations research/mathematical programming. They focus on the role of experimentation and engineering techniques in the design and evaluation of algorithms, data structures, and computational optimization methods.
This book constitutes the proceedings of the Second International Conference on Human Aspects of Information Security, Privacy, and Trust, HAS 2014, held as part of HCI International 2014 which took place in Heraklion, Crete, Greece, in June 2014 and incorporated 14 conferences which similar thematic areas. HCII 2014 received a total of 4766 submissions, of which 1476 papers and 220 posters were accepted for publication after a careful reviewing process. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of Human-Computer Interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 38 papers presented in the HAS 2014 proceedings are organized in topical sections named: usable security; authentication and passwords; security policy and awareness; human behaviour in cyber security and privacy issues.
The chapters which appear in this volume are selected studies presented at the First International Conference on Engineering and Applied Sciences Optimization (OPT-i), Kos, Greece, 4-6 June 2014 and works written by friends, former colleagues and students of the late Professor M. G. Karlaftis; all in the area of optimization that he loved and published so much in himself. The subject areas represented here range from structural optimization, logistics, transportation, traffic and telecommunication networks to operational research, metaheuristics, multidisciplinary and multiphysics design optimization, etc. This volume is dedicated to the life and the memory of Professor Matthew G. Karlaftis, who passed away a few hours before he was to give the opening speech at OPT-i. All contributions reflect the warmth and genuine friendship which he enjoyed from his associates and show how much his scientific contribution has been appreciated. He will be greatly missed and it is hoped that this volume will be received as a suitable memorial to his life and achievements.
The Applications of Computer Algebra (ACA) conference covers a wide range of topics from Coding Theory to Differential Algebra to Quantam Computing, focusing on the interactions of these and other areas with the discipline of Computer Algebra. This volume provides the latest developments in the field as well as its applications in various domains, including communications, modelling, and theoretical physics. The book will appeal to researchers and professors of computer algebra, applied mathematics, and computer science, as well as to engineers and computer scientists engaged in research and development.
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference on Availability, Reliability and Security, CD-ARES 2013, held in Regensburg, Germany, in September 2013. The 21 revised papers presented were carefully reviewed and selected for inclusion in the volume. The papers concentrate on the many aspects of information systems bridging the gap between research results in computer science and the many application fields. They are organized in the following topical sections: economic, ethical, legal, multilingual, organizational and social aspects; context-oriented information integration; data/information management as a service; context-oriented information integration and location-aware computing; security and privacy; risk management and business continuity; and security and privacy and location based applications. Also included are 15 papers from a special session on Human-Computer Interaction and Knowledge Discovery (HCI-KDD 2013).
This book constitutes the refereed proceedings of the 32nd IFIP TC 11 International Conference on ICT Systems Security and Privacy Protection, SEC 2017, held in Rome, Italy, in May 2017. The 38 revised full papers presented were carefully reviewed and selected from 199 submissions. The papers are organized in the following topical sections: network security and cyber attacks; security and privacy in social applications and cyber attacks defense; private queries and aggregations; operating systems and firmware security; user authentication and policies; applied cryptography and voting schemes; software security and privacy; privacy; and digital signature, risk management, and code reuse attacks.
This book constitutes the refereed proceedings of 11 symposia and workshops held at the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The total of 75 papers presented in this volume was carefully reviewed and selected from a total of 190 submissions to all workshops: UbiSafe 2017: The 9th IEEE International Symposium on UbiSafe Computing ISSR 2017: The 9th IEEE International Workshop on Security in e-Science and e-Research TrustData 2017: The 8th International Workshop on Trust, Security and Privacy for Big Data TSP 2017: The 7th International Symposium on Trust, Security a...