Narrow your search
Listing 1 - 10 of 66 << page
of 7
>>
Sort by
Probabilistic reasoning in multiagent systems : a graphical models approach
Author:
ISBN: 0521813085 0511020740 0521153905 9786610434039 0511177720 0511148127 0511305168 0511546939 1280434031 0511045441 9780511020742 9780511045448 9780521813082 9780511148125 9780511546938 9781280434037 9780521153904 1107133157 9781107133150 6610434034 9780511177729 9780511305160 Year: 2002 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This 2002 book investigates the opportunities in building intelligent decision support systems offered by multi-agent distributed probabilistic reasoning. Probabilistic reasoning with graphical models, also known as Bayesian networks or belief networks, has become increasingly an active field of research and practice in artificial intelligence, operations research and statistics. The success of this technique in modeling intelligent decision support systems under the centralized and single-agent paradigm has been striking. Yang Xiang extends graphical dependence models to the distributed and multi-agent paradigm. He identifies the major technical challenges involved in such an endeavor and presents the results. The framework developed in the book allows distributed representation of uncertain knowledge on a large and complex environment embedded in multiple cooperative agents, and effective, exact and distributed probabilistic inference.


Book
Bioinspiration : From Nano to Micro Scales
Author:
ISBN: 1461453038 1461453720 1283934086 Year: 2012 Publisher: New York, NY : Springer New York : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Methods in bioinspiration and biomimicking have been around for a long time. However, due to current advances in modern physical, biological sciences, and technologies, our understanding of the methods have evolved to a new level. This is due not only to the identification of mysterious and fascinating phenomena but also to the understandings of the correlation between the structural factors and the performance based on the latest theoretical, modeling, and experimental technologies. Bioinspiration: From Nano to Micro Scale provides readers with a broad view of the frontiers of research in the area of bioinspiration from the nano to macroscopic scales, particularly in the areas of biomineralization, antifreeze protein, and antifreeze effect. It also covers such methods as the lotus effect and superhydrophobicity, structural colors in animal kingdom and beyond, as well as behavior in ion channels. A number of international experts in related fields have contributed to this book, which offers a comprehensive and synergistic look into challenging issues such as theoretical modeling, advanced surface probing, and fabrication. The book also provides a link to the engineering of novel advanced materials playing an important role in advancing technologies in various fields.


Book
Software Similarity and Classification
Authors: ---
ISBN: 1447129083 9786613703422 1280793031 1447129091 Year: 2012 Publisher: London : Springer London : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each application and demonstrates that considering these applied problems as a similarity and classification problem enables techniques to be shared between areas. Additionally, the authors present in-depth case studies using the software similarity and classification techniques developed throughout the book.


Digital
Software Similarity and Classification
Authors: ---
ISBN: 9781447129097 Year: 2012 Publisher: London Springer London

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Frontiers and Progress of Current Soft Matter Research
Author:
ISBN: 9789811592973 9789811592980 9789811592997 9789811592966 Year: 2021 Publisher: Singapore Springer Singapore, Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book covers some fundamental aspects and frontiers in non-equilibrium physics and soft matter research. Apart from the basic knowledge on nonlinear statistic physics, dynamics, computer simulations, and main approaches and emerging systems in soft matter research, particular attention is devoted to new conceptual flexible functional materials and the enriching areas, such as silk meso-molecular materials, molecular gels, liquid crystals, flexible electronics and new types of catalysis, etc. One of the main characteristics of this book is to start with the structure formation dynamics and the correlation between the structures and macroscopic performance. This lays down the foundation for the mesoscopic materials design and functionalization. The book is intended for upper undergraduate students, graduate students, and researchers who are interested in soft matter researches. As one of main references, the basic principles and technologies of computer simulations and experimental methods adopted in soft matter research are also explained. Illustrations and tables are included in this book to improve the readability, and examples and exercises are added to help understanding. .


Book
Growth kinetics and morphology of crystals in relation to interfaciaal structure : (Thèse = Thesis)
Author:
Year: 1993 Publisher: Nijmegen

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Wireless ad hoc and sensor networks : theory and applications
Author:
ISBN: 1107178630 1281775754 9786611775759 0511423764 0511422598 0511424248 0511754728 0511421931 051142325X Year: 2008 Publisher: Cambridge : Cambridge University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

If you have to understand and optimize the performance of wireless ad hoc and sensor networks, this explanation provides you with the information and insights you need. It delivers an understanding of the underlying problems, and the techniques to develop efficient solutions and maximize network performance. Taking an algorithmic and theoretical approach, Li dissects key layers of a wireless network, from the physical and MAC layers (covering the IEEE 802.11 and 802.16 protocols, and protocols for wireless sensor networks and Bluetooth) through to the network routing layer. In doing so he reviews the practical protocols, formulates problems mathematically, solves them algorithmically and then analyses the performance. Graduate students, researchers and practitioners needing an overview of the various algorithmic, graph theoretical, computational geometric and probabilistic approaches to solving problems in designing these networks will find this an invaluable resource. Additional resources for this title are available online at www.cambridge.org/9780521865234.


Book
Green, Pervasive, and Cloud Computing : 11th International Conference, GPC 2016, Xi'an, China, May 6-8, 2016. Proceedings
Authors: --- ---
ISBN: 3319390767 3319390775 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 8th International Conference on Grid and Pervasive Computing, GPC 2016, held in Seoul, Korea, in May 2016. The 20 revised papers were carefully reviewed and selected from 94 submissions. The conference contains various aspects including green computing, cloud computing, virtualisation, data and storage, and network security.

Keywords

Computer science. --- Computer communication systems. --- Software engineering. --- Algorithms. --- Information storage and retrieval. --- Computer Science. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Software Engineering. --- Information Storage and Retrieval. --- Algorithm Analysis and Problem Complexity. --- Informatics --- Algorism --- Computer software engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Science --- Algebra --- Arithmetic --- Engineering --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Distributed processing --- Information storage and retrieva. --- Computer software. --- Software, Computer --- Computer systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Cloud computing --- Web services --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer networks. --- Computer and Information Systems Applications. --- Data centers


Book
Honeypot Frameworks and Their Applications: A New Framework
Authors: --- ---
ISBN: 9811077398 981107738X Year: 2018 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks. The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems.

Keywords

Computer security. --- Malware (Computer software) --- Prevention. --- Computer science. --- Computer organization. --- Computer science --- Computer simulation. --- Computer Science. --- Security. --- Computer Systems Organization and Communication Networks. --- Systems and Data Security. --- Applications of Graph Theory and Complex Networks. --- Math Applications in Computer Science. --- Simulation and Modeling. --- Mathematics. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software --- Data protection. --- Computer network architectures. --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- Informatics --- Science --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Physics. --- Computer science—Mathematics. --- Natural philosophy --- Philosophy, Natural --- Physical sciences --- Dynamics --- Organization, Computer

Listing 1 - 10 of 66 << page
of 7
>>
Sort by