You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
"Big brother, don't go! Rui Rui is scared!" The girl mumbled in her dreams as she waved her hands as if she wanted to grab onto something. Suddenly, she sat up, and her face was covered with sweat. She looked around in confusion. It was pitch black. "Big brother doesn't need the stamen, big brother doesn't need the stamen ..." The girl murmured again and again. He leaned against the corner of the wall, burying his head tightly in his legs. He hugged himself tightly while his shoulders twitched. Listen carefully, and you will hear the whimpers of the girl. Slowly, he fell asleep again ...
The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.
The four-volume set CCIS 1791, 1792, 1793 and 1794 constitutes the refereed proceedings of the 29th International Conference on Neural Information Processing, ICONIP 2022, held as a virtual event, November 22–26, 2022. The 213 papers presented in the proceedings set were carefully reviewed and selected from 810 submissions. They were organized in topical sections as follows: Theory and Algorithms; Cognitive Neurosciences; Human Centered Computing; and Applications. The ICONIP conference aims to provide a leading international forum for researchers, scientists, and industry professionals who are working in neuroscience, neural networks, deep learning, and related fields to share their new ideas, progress, and achievements.
This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019. The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.
This book constitutes the refereed proceedings of the 21th International Conference on Information and Communications Security, ICICS 2019, held in Beijing, China, in December 2019. The 47 revised full papers were carefully selected from 199 submissions. The papers are organized in topics on malware analysis and detection, IoT and CPS security enterprise network security, software security, system security, authentication, applied cryptograph internet security, machine learning security, machine learning privacy, Web security, steganography and steganalysis.
The three-volume set of LNCS 12532, 12533, and 12534 constitutes the proceedings of the 27th International Conference on Neural Information Processing, ICONIP 2020, held in Bangkok, Thailand, in November 2020. Due to COVID-19 pandemic the conference was held virtually. The 187 full papers presented were carefully reviewed and selected from 618 submissions. The papers address the emerging topics of theoretical research, empirical studies, and applications of neural information processing techniques across different domains. The third volume, LNCS 12534, is organized in topical sections on biomedical information; neural data analysis; neural network models; recommender systems; time series analysis.
This book is a gentle introduction to dominance-based query processing techniques and their applications. The book aims to present fundamental as well as some advanced issues in the area in a precise, but easy-to-follow, manner. Dominance is an intuitive concept that can be used in many different ways in diverse application domains. The concept of dominance is based on the values of the attributes of each object. An object dominates another object if is better than . This goodness criterion may differ from one user to another. However, all decisions boil down to the minimization or maximization of attribute values. In this book, we will explore algorithms and applications related to dominance-based query processing. The concept of dominance has a long history in finance and multi-criteria optimization. However, the introduction of the concept to the database community in 2001 inspired many researchers to contribute to the area. Therefore, many algorithmic techniques have been proposed for the efficient processing of dominance-based queries, such as skyline queries, -dominant queries, and top- dominating queries, just to name a few.
This book constitutes the first of 3 volumes of refereed conference proceedings of the 8th International Conference on Intelligent Computing, ICIC 2012, held in Huangshan, China, in July 2012. The 242 revised full papers presented were carefully reviewed and selected from 753 submissions. The 84 papers included in this volume are organized in topical sections on evolutionary learning and genetic algorithms, fuzzy theory and models, swarm intelligence and optimization, kernel methods and supporting vector machines, nature inspired computing and optimization, systems biology and computational biology, knowledge discovery and data mining, graph theory and algorithms, machine learning theory and...
This volume constitutes selected papers presented at the Second International Symposium on Emerging Information Security and Applications, EISA 2021, held in Copenhagen, Denmark, in November 2021.* The 10 full papers and 1 short paper presented in this volume were thoroughly reviewed and selected from the 36 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. *Due to the COVID-19 pandemic the conference was held online.
This book contains the proceedings of the International Conference on Industrial Design and Environmental Engineering (IDEE 2023) held via the hybrid form in Zhengzhou, China from November 24th to 26th, 2023. The specific topics covered in this conference include innovative design, multimedia applied art design, environmental analysis and monitoring, pollution control programs, hydrology and water resources engineering, urban and regional planning, global climate change and international carbon emission reduction cooperation. The conference aims to bring together various professionals from the scientific community to foster connections between science, technology, and industry, and provide a...