- Table View
- List View
Computer Information Systems and Industrial Management: 21st International Conference, CISIM 2022, Barranquilla, Colombia, July 15–17, 2022, Proceedings (Lecture Notes in Computer Science #13293)
by Khalid Saeed Jiří DvorskýThis book constitutes the proceedings of the 21st International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2022, held in Barranquilla, Colombia, in July 2022. The 28 papers presented together with 3 keynotes were carefully reviewed and selected from 68 submissions. The main topics covered by the chapters in this book are biometrics, security systems, multimedia, classification and clustering, and industrial management as well as interesting papers on computer information systems as applied to wireless networks, computer graphics, and intelligent systems.
Computer Information Systems and Industrial Management: 23rd International Conference, CISIM 2024, Bialystok, Poland, September 27–29, 2024, Proceedings (Lecture Notes in Computer Science #14902)
by Khalid Saeed Jiří DvorskýThis book constitutes the proceedings of the 23rd International Conference on Computer Information Systems and Industrial Management, CISIM 2024, held in Bialystok, Poland, during September 27-29, 2024. The 31 full papers presented were carefully reviewed and selected from 47 submissions. These papers focus on biometrics and pattern recognition applications; computer information systems and security; industrial management and other applications; machine learning and artificial neural networks; modelling and optimization.
Computer Information Systems and Industrial Management: 22nd International Conference, CISIM 2023, Tokyo, Japan, September 22–24, 2023, Proceedings (Lecture Notes in Computer Science #14164)
by Khalid Saeed Jiří Dvorský Nobuyuki Nishiuchi Makoto FukumotoThis book constitutes the proceedings of the 22nd International Conference on Computer Information Systems and Industrial Management, CISIM 2023, held in Tokio, Japan, during September 22-24, 2023. The 36 papers presented in this book were carefully reviewed and selected from 77 submissions. They were organized in topical sections as follows: biometrics and pattern recognition applications; computer information systems and security; industrial management and other applications; machine learning and artificial neural networks; modelling and optimization; wellbeing and affective engineering; and machine learning using biometric data and kansei data.
Computer Information Systems and Industrial Management: 17th International Conference, CISIM 2018, Olomouc, Czech Republic, September 27-29, 2018, Proceedings (Lecture Notes in Computer Science #11127)
by Khalid Saeed Władysław HomendaThis book constitutes the proceedings of the 17th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2018, held in Olomouc, Czech Republic, in September 2018. The 42 full papers presented together with 4 keynotes were carefully reviewed and selected from 69 submissions. The main topics covered by the chapters in this book are biometrics, security systems, multimedia, classification and clustering, and industrial management. Besides these, the reader will find interesting papers on computer information systems as applied to wireless networks, computer graphics, and intelligent systems. The papers are organized in the following topical sections: biometrics and pattern recognition applications; computer information systems; industrial management and other applications; machine learning and high performance computing; modelling and optimization; and various aspects of computer security.
Computer Information Systems and Industrial Management: 15th IFIP TC8 International Conference, CISIM 2016, Vilnius, Lithuania, September 14-16, 2016, Proceedings (Lecture Notes in Computer Science #9842)
by Khalid Saeed Władysław HomendaThis book constitutes the proceedings of the 15th IFIP TC8 International Conference on Computer Information Systems and Industrial Management, CISIM 2016, held in Vilnius, Lithuania, in September 2016. The 63 regular papers presented together with 1 inivted paper and 5 keynotes in this volume were carefully reviewed and selected from about 89 submissions. The main topics covered are rough set methods for big data analytics; images, visualization, classification; optimization, tuning; scheduling in manufacturing and other applications; algorithms; decisions; intelligent distributed systems; and biometrics, identification, security.
Computer Information Systems and Industrial Management: 16th IFIP TC8 International Conference, CISIM 2017, Bialystok, Poland, June 16-18, 2017, Proceedings (Lecture Notes in Computer Science #10244)
by Khalid Saeed Władysław Homenda Rituparna ChakiThis book constitutes the proceedings of the 16th IFIP TC8 International Conference on Computer Information Systems and Industrial Management, CISIM 2017, held in Bialystok, Poland, in June 2017.The 60 regular papers presented together with 5 keynotes were carefully reviewed and Selected from 85 submissions. They are organized in the following topical sections: algorithms; biometrics and pattern recognition applications; data analysis and information retrieval; engineering of enterprise software products; industrial management and other applications; modelling and optimization; various aspects of computer security.
Computer Information Systems and Industrial Management: 14th IFIP TC 8 International Conference, CISIM 2015, Warsaw, Poland, September 24-26, 2015, Proceedings (Lecture Notes in Computer Science #9339)
by Khalid Saeed Wladyslaw HomendaThis book constitutes the proceedings of the 14th IFIP TC 8 International Conference on Computer Information Systems and Industrial Management, CISIM 2015, held in Warsaw, Poland, in September 2015.The 47 papers presented in this volume were carefully reviewed and selected from about 80 submissions. The main topics covered are biometrics, security systems, multimedia, classification and clustering with applications, and industrial management.
Computer Information Systems and Industrial Management: 13th IFIP TC 8 International Conference, CISIM 2014, Ho Chi Minh City, Vietnam, November 5-7, 2014, Proceedings (Lecture Notes in Computer Science #8838)
by Khalid Saeed Václav SnáselThis book constitutes the proceedings of the 13th IFIP TC 8 International Conference on Computer Information Systems and Industrial Management, CISIM 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 60 paper presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: algorithms; biometrics and biometrics applications; data analysis and information retrieval; industrial management and other applications; modelling and optimization; networking; pattern recognition and image processing; and various aspects of computer security.
Computer Insecurity: Risking the System
by Steven M. FurnellWritten specifically for business managers. Emphasizes issues over technology.
Computer Integrated Manufacturing: Current Status and Challenges (NATO ASI Subseries F: #49)
by Kiyoji Asai Gunduz UlusoyThe Current state of expectations is that Computer Integrated Manufacturing (CIM) will ulti mately determine the industrial growth of world nations within the next few decades. Computer Aided Design (CAD), Computer Aided Manufacturing (CAM), Flexible Manufacturing Systems (FMS), Robotics together with Knowledge and Information Based Systems (KIBS) and Com munication Networks are expected to develop to a mature state to respond effectively to the managerial requirements of the factories of the future that are becoming highly integrated and complex. CIM represents a new production approach which will allow the factories to deliver a high variety of products at a low cost and with short production cycles. The new technologies for CIM are needed to develop manufacturing environments that are smarter, faster, close-cou pled, integrated, optimized, and flexible. Sophistication and a high degree of specialization in materials science, artificial intelligence, communications technology and knowledge-information science techniques are needed among others for the development of realizable and workable CIM systems that are capable of adjusting to volatile markets. CIM factories are to allow the production of a wide variety of similar products in small batches through standard but multi mission oriented designs that accommodate flexibility with specialized software.
Computer Integrated Production Systems and Organizations (NATO ASI Subseries F: #134)
by Felix Schmid Stephen Evans Andrew W. S. Ainger Robert J. GrieveThe Background to the Institute The NATO Advanced Study Institute (ASI) 'People and Computers - Applying an Anthropocentric Approach to Integrated Production Systems and Organisations' came about after the distribution of a NATO fact sheet to BruneI University, which described the funding of ASls. The 'embryonic' director of the ASI brought this opportunity to the attention of the group of people, (some at BruneI and some from outside), who were together responsible for the teaching and management of the course in Computer Integrated Manufacturing (CIM) in BruneI's Department of Manufacturing and Engineering Systems. This course had been conceived in 1986 and was envisaged as a vehicle for teaching manufacturing engineering students the technology of information integration through project work. While the original idea of the course had also included the organisational aspects of CIM, the human factors questions were not considered. This shortcoming was recognised and the trial run of the course in 1988 contained some lectures on 'people' issues. The course team were therefore well prepared and keen to explore the People, Organisation and Technology (POT) aspects of computer integration, as applied to industrial production. A context was proposed which would allow the inclusion of people from many different backgrounds and which would open up time and space for reflection. The proposal to organise a NATO ASI was therefore welcomed by all concerned.
Computer, Intelligent Computing and Education Technology
by Hsiang-Chuan Liu Wen-Pei Sung Wenli YaoThis proceedings set contains selected Computer, Information and Education Technology related papers from the 2014 International Conference on Computer, Intelligent Computing and Education Technology (CICET 2014), held March 27-28, 2014 in Hong Kong. The proceedings aims to provide a platform for researchers, engineers and academics as well as indu
Computer Intensive Methods in Control and Signal Processing: The Curse of Dimensionality
by Kevin Warwick Miroslav KarnyDue to the rapid increase in readily available computing power, a corre sponding increase in the complexity of problems being tackled has occurred in the field of systems as a whole. A plethora of new methods which can be used on the problems has also arisen with a constant desire to deal with more and more difficult applications. Unfortunately by increasing the ac curacy in models employed along with the use of appropriate algorithms with related features, the resultant necessary computations can often be of very high dimension. This brings with it a whole new breed of problem which has come to be known as "The Curse of Dimensionality" . The expression "Curse of Dimensionality" can be in fact traced back to Richard Bellman in the 1960's. However, it is only in the last few years that it has taken on a widespread practical significance although the term di mensionality does not have a unique precise meaning and is being used in a slightly different way in the context of algorithmic and stochastic complex ity theory or in every day engineering. In principle the dimensionality of a problem depends on three factors: on the engineering system (subject), on the concrete task to be solved and on the available resources. A system is of high dimension if it contains a lot of elements/variables and/or the rela tionship/connection between the elements/variables is complicated.
Computer Intensive Methods in Statistics
by Silvelyn Zwanzig Behrang MahjaniThis textbook gives an overview of statistical methods that have been developed during the last years due to increasing computer use, including random number generators, Monte Carlo methods, Markov Chain Monte Carlo (MCMC) methods, Bootstrap, EM algorithms, SIMEX, variable selection, density estimators, kernel estimators, orthogonal and local polynomial estimators, wavelet estimators, splines, and model assessment. Computer Intensive Methods in Statistics is written for students at graduate level, but can also be used by practitioners. Features Presents the main ideas of computer-intensive statistical methods Gives the algorithms for all the methods Uses various plots and illustrations for explaining the main ideas Features the theoretical backgrounds of the main methods. Includes R codes for the methods and examples Silvelyn Zwanzig is an Associate Professor for Mathematical Statistics at Uppsala University. She studied Mathematics at the Humboldt- University in Berlin. Before coming to Sweden, she was Assistant Professor at the University of Hamburg in Germany. She received her Ph.D. in Mathematics at the Academy of Sciences of the GDR. Since 1991, she has taught Statistics for undergraduate and graduate students. Her research interests have moved from theoretical statistics to computer intensive statistics. Behrang Mahjani is a postdoctoral fellow with a Ph.D. in Scientific Computing with a focus on Computational Statistics, from Uppsala University, Sweden. He joined the Seaver Autism Center for Research and Treatment at the Icahn School of Medicine at Mount Sinai, New York, in September 2017 and was formerly a postdoctoral fellow at the Karolinska Institutet, Stockholm, Sweden. His research is focused on solving large-scale problems through statistical and computational methods.
Computer Intensive Methods in Statistics
by Silvelyn Zwanzig Behrang MahjaniThis textbook gives an overview of statistical methods that have been developed during the last years due to increasing computer use, including random number generators, Monte Carlo methods, Markov Chain Monte Carlo (MCMC) methods, Bootstrap, EM algorithms, SIMEX, variable selection, density estimators, kernel estimators, orthogonal and local polynomial estimators, wavelet estimators, splines, and model assessment. Computer Intensive Methods in Statistics is written for students at graduate level, but can also be used by practitioners. Features Presents the main ideas of computer-intensive statistical methods Gives the algorithms for all the methods Uses various plots and illustrations for explaining the main ideas Features the theoretical backgrounds of the main methods. Includes R codes for the methods and examples Silvelyn Zwanzig is an Associate Professor for Mathematical Statistics at Uppsala University. She studied Mathematics at the Humboldt- University in Berlin. Before coming to Sweden, she was Assistant Professor at the University of Hamburg in Germany. She received her Ph.D. in Mathematics at the Academy of Sciences of the GDR. Since 1991, she has taught Statistics for undergraduate and graduate students. Her research interests have moved from theoretical statistics to computer intensive statistics. Behrang Mahjani is a postdoctoral fellow with a Ph.D. in Scientific Computing with a focus on Computational Statistics, from Uppsala University, Sweden. He joined the Seaver Autism Center for Research and Treatment at the Icahn School of Medicine at Mount Sinai, New York, in September 2017 and was formerly a postdoctoral fellow at the Karolinska Institutet, Stockholm, Sweden. His research is focused on solving large-scale problems through statistical and computational methods.
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint (Information Science and Statistics)
by David J. MarchetteThis book covers the basic statistical and analytical techniques of computer intrusion detection. It is the first to present a data-centered approach to these problems. It begins with a description of the basics of TCP/IP, followed by chapters dealing with network traffic analysis, network monitoring for intrusion detection, host based intrusion detection, and computer viruses and other malicious code.
Computer Jargon - The Illustrated Glossary of Basic Computer Terminology: Decode and simplify complex computer terms with easy-to-follow visual guides
by Kevin WilsonAn easy-to-read guide that cuts through computer jargon, using visual aids and step-by-step explanations. Understand tech terms effortlessly with full-color illustrations and concise, clear language.Key FeaturesStep-by-step visual approach simplifies computer jargon.Full-color illustrations aid in understanding.A user-friendly structure helps readers decode terminology at their own pace.Book DescriptionThis book provides a clear and accessible guide to demystifying technical terms. Using a step-by-step approach, it simplifies complex computer terminology, offering detailed explanations alongside full-color illustrations, screenshots, and photographs. Each term is broken down into easy-to-understand language, making it accessible even for those with little technical background. It covers key areas of computer terminology, including networking, internet terms, and digital media formats. Readers are provided with a broad range of terms, from basic functions to security and privacy concepts, boosting their confidence in navigating the technical language of modern technology. Additionally, this glossary addresses emerging technologies and their jargon, defining terms related to artificial intelligence, cloud computing, and cybersecurity. Whether you're a beginner or a moderately experienced user, this guide is an ideal reference for decoding tech terms and understanding the digital world with confidence and clarity.What you will learnDecode technical acronyms quickly and easily.Identify essential hardware and software terms.Simplify and understand internet and networking jargon.Grasp common file formats and media terminology.Recognize security and privacy terms confidently.Learn to decode tech language commonly used in everyday computing.Who this book is forThe ideal audience for this book includes beginner to moderately experienced computer users who may feel overwhelmed by the technical jargon they encounter. Readers do not need prior deep technical knowledge, but a basic familiarity with computers is helpful. This book is also suitable for users looking to refresh or expand their understanding of common acronyms and terminology used in everyday computing.
Computer Keyboard Overview Diagram (large print)
by RnibThis diagram shows an overview of a computer keyboard layout in blocks. Keys which are immediately adjacent to each other are shown as a block of continuous texture or colour. There is a locator dot shown, which will be at the top left of the page when the image is the right way up. In the bottom left of the image is the biggest block, block 1 the main keyboard (alphabet, numbers and punctuation keys). Up from block 1 is block 2, the top line of keys (escape key, function keys). To the right of block 2 is block 3, the three system keys. Down from here is block 4, the six pack. Down again is block 5, the arrow cursor keys. On the far right of the image is block 6, the number pad. At the bottom of the page is a short key which names the blocks.
Computer Keyboard Overview Diagram (UEB contracted)
by RnibThis diagram shows an overview of a computer keyboard layout in blocks. Keys which are immediately adjacent to each other are shown as a block of continuous texture or colour. There is a locator dot shown, which will be at the top left of the page when the image is the right way up. In the bottom left of the image is the biggest block, block 1 the main keyboard (alphabet, numbers and punctuation keys). Up from block 1 is block 2, the top line of keys (escape key, function keys). To the right of block 2 is block 3, the three system keys. Down from here is block 4, the six pack. Down again is block 5, the arrow cursor keys. On the far right of the image is block 6, the number pad. At the bottom of the page is a short key which names the blocks.
Computer Keyboard Overview Diagram (UEB uncontracted)
by RnibThis diagram shows an overview of a computer keyboard layout in blocks. Keys which are immediately adjacent to each other are shown as a block of continuous texture or colour. There is a locator dot shown, which will be at the top left of the page when the image is the right way up. In the bottom left of the image is the biggest block, block 1 the main keyboard (alphabet, numbers and punctuation keys). Up from block 1 is block 2, the top line of keys (escape key, function keys). To the right of block 2 is block 3, the three system keys. Down from here is block 4, the six pack. Down again is block 5, the arrow cursor keys. On the far right of the image is block 6, the number pad. At the bottom of the page is a short key which names the blocks.
Computer Law (PDF)
by Chris ReedThis edition is fully updated to reflect the Digital Economy Act 2010 and changes to consumer protection law at EU level including the Unfair Commercial Practices Directive. Analysis of recent case law is also incorporated including, amongst others, the series of trade mark actions against eBay and copyrights suits against Google as well as the implications for IT contracts of BSkyB Ltd v HP Enterprise Services UK Ltd. All chapters have been revised to take into account the rapid evolution of the ways in which we consume, generate, store and exchange information, such as cloud computing, off-shoring and Web 2.0.
Computer Logic: Design Principles and Applications
by John Y. HsuThis book provides the reader with the key concepts and techniques of modern digital logic design and applications. This concise treatment provides essential development and explanations for both classical and modern topics. The modern topics include unicode, unipolar transistors, copper technology, flash memory, HDL, verilog and logic simulation software tools. Also covered are combinatorial logic circuits and transistor circuits. It will be an essential resource for computer scientists, logic circuit designers and computer engineers.
Computer Mathematics: 9th Asian Symposium (ASCM2009), Fukuoka, December 2009, 10th Asian Symposium (ASCM2012), Beijing, October 2012, Contributed Papers and Invited Talks
by Ruyong Feng Wen-Shin Lee Yosuke SatoThis book covers original research and the latest advances in symbolic, algebraic and geometric computation; computational methods for differential and difference equations, symbolic-numerical computation; mathematics software design and implementation; and scientific and engineering applications based on features, invited talks, special sessions and contributed papers presented at the 9th (in Fukuoka, Japan in 2009) and 10th (in Beijing China in 2012) Asian Symposium on Computer Mathematics (ASCM). Thirty selected and refereed articles in the book present the conference participants’ ideas and views on researching mathematics using computers.
Computer Mathematics: 8th Asian Symposium, ASCM 2007, Singapore, December 15-17, 2007, Revised and Invited Papers (Lecture Notes in Computer Science #5081)
by Deepak KapurThis book constitutes thoroughly refereed post-conference proceedings of the 8th Asian Symposium on Computer Mathematics, ASCM 2007, held in Singapore in December 2007. The 22 revised full papers and 5 revised poster papers presented together with 3 invited lectures were carefully selected during two rounds of reviewing and improvement from 65 submissions. The papers are organized in topical sections on algorithms and implementations, numerical methods and applications, cryptology, and computational logic.