You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
The importance of human-computer system interaction problems is increasing due to the growing expectations of users on general computer systems capabilities in human work and life facilitation. Users expect system which is not only a passive tool in human hands but rather an active partner equipped with a sort of artificial intelligence, having access to large information resources, being able to adapt its behavior to the human requirements and to collaborate with the human users. This book collects examples of recent human-computer system solutions. The content of the book is divided into three parts. Part I is devoted to detection, recognition and reasoning in different circumstances and applications. Problems associated with data modeling, acquisition and mining are presented by papers collected in part II and part III is devoted to Optimization.
Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments. -Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems. -Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects).
The international conference Intelligent Information Processing and Web Mining IIS:IIPWM’05, organized in Gda?sk-Sobieszewo on 13–16th June, 2005, was a continuation of a long tradition of conferences on applications of Arti?cial Intelligence (AI) in Information Systems (IS), organized by the Institute of Computer Science of Polish Academy of Sciences in cooperation with other scienti?c and business institutions. The Institute itself is deeply engaged in research both in AI and IS and many scientists view it as a leading institution both in fundamental and - plied research in these areas in Poland. The originators of this conference series, Prof. M. D?browski and Dr. M. Michalewicz had i...
The aim of the CEEMAS conference series is to provide a biennial forum for the presentation of multi-agent research and development results. With its p- ticular geographicalorientation towards Central and Eastern Europe, CEEMAS has become an internationally recognised event with participants from all over the world. After the successful CEEMAS conferences in St. Petersburg (1999), Cracow (2001) and Prague (2003), the 2005 CEEMAS conference takes place in Budapest. The programme committee of the conference series consists of est- lished researchers from the region and renowned international colleagues, sh- ing the prominent rank of CEEMAS among the leading events in multi-agent systems. In th...
This is Volume III of the four-volume set LNCS 3991-3994 constituting the refereed proceedings of the 6th International Conference on Computational Science, ICCS 2006. The 98 revised full papers and 29 revised poster papers of the main track presented together with 500 accepted workshop papers were carefully reviewed and selected for inclusion in the four volumes. The coverage spans the whole range of computational science.
Part of a four-volume set, this book constitutes the refereed proceedings of the 7th International Conference on Computational Science, ICCS 2007, held in Beijing, China in May 2007. The papers cover a large volume of topics in computational science and related areas, from multiscale physics to wireless networks, and from graph theory to tools for program development.
This book brings together papers of well-known specialists in game theory and adjacent problems. It presents the basic results in dynamic games, stochastic games, applications of game theoretical methods in ecology and economics and methodological aspects of game theory.
In today’s society the issue of security has become a crucial one. This volume brings together contributions on the use of knowledge-based technology in security applications by the world’s leading researchers in the field.
This book constitutes the refereed proceedings of the International Conference on Rough Sets and Emerging Intelligent Systems Paradigms, held in Warsaw, Poland in June 2007. The conference was dedicated to the memory of Professor Zdzislaw Pawlak. Seventy-three full papers are presented, together with two keynote lectures and eleven invited papers. Each of these papers was subject to a strict editorial review.
The refereed proceedings of the International Central and Eastern European Conference on Multi-Agent Systems, CEEMAS 2003, held in Prague, Czech Republic, in June 2003. The 58 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on formal methods, social knowledge and meta-reasoning, negotiation, and policies, ontologies and languages, planning, coalitions, evolution and emergent behaviour, platforms, protocols, security, real-time and synchronization, industrial applications, e-business and virtual enterprises, and Web and mobile agents.