Listing 1 - 10 of 66 | << page >> |
Sort by
|
Choose an application
This 2002 book investigates the opportunities in building intelligent decision support systems offered by multi-agent distributed probabilistic reasoning. Probabilistic reasoning with graphical models, also known as Bayesian networks or belief networks, has become increasingly an active field of research and practice in artificial intelligence, operations research and statistics. The success of this technique in modeling intelligent decision support systems under the centralized and single-agent paradigm has been striking. Yang Xiang extends graphical dependence models to the distributed and multi-agent paradigm. He identifies the major technical challenges involved in such an endeavor and presents the results. The framework developed in the book allows distributed representation of uncertain knowledge on a large and complex environment embedded in multiple cooperative agents, and effective, exact and distributed probabilistic inference.
Distributed artificial intelligence --- Bayesian statistical decision theory --- Intelligent agents (Computer software) --- Intelligence artificielle répartie --- Statistique bayésienne --- Agents intelligents (logiciels) --- Data processing --- Informatique --- Information Technology --- Computer Science (Hardware & Networks) --- Distributed artificial intelligence. --- Intelligent agents (Computer software). --- Computer Science --- Engineering & Applied Sciences --- Data processing. --- Intelligence artificielle répartie --- Statistique bayésienne --- Agents, Autonomous (Computer software) --- Agents, Cognitive (Computer software) --- Agents, Intelligent (Computer software) --- Assistants, Cognitive (Computer software) --- Assistants, Intelligent software --- Autonomous agents (Computer software) --- Cognitive agents (Computer software) --- Cognitive assistants (Computer software) --- IAs (Computer software) --- Intelligent agent software --- Intelligent software agents --- Intelligent software assistants --- Software agents (Computer software) --- Special agents (Computer software) --- Bayes' solution --- Bayesian analysis --- DAI (Artificial intelligence) --- Distributed AI (Artificial intelligence) --- Artificial intelligence --- Statistical decision --- Computer programs --- E-books --- Multiagent systems. --- Agent-based model (Computer software) --- MASs (Multiagent systems) --- Multi-agent systems --- Systems, Multiagent
Choose an application
Methods in bioinspiration and biomimicking have been around for a long time. However, due to current advances in modern physical, biological sciences, and technologies, our understanding of the methods have evolved to a new level. This is due not only to the identification of mysterious and fascinating phenomena but also to the understandings of the correlation between the structural factors and the performance based on the latest theoretical, modeling, and experimental technologies. Bioinspiration: From Nano to Micro Scale provides readers with a broad view of the frontiers of research in the area of bioinspiration from the nano to macroscopic scales, particularly in the areas of biomineralization, antifreeze protein, and antifreeze effect. It also covers such methods as the lotus effect and superhydrophobicity, structural colors in animal kingdom and beyond, as well as behavior in ion channels. A number of international experts in related fields have contributed to this book, which offers a comprehensive and synergistic look into challenging issues such as theoretical modeling, advanced surface probing, and fabrication. The book also provides a link to the engineering of novel advanced materials playing an important role in advancing technologies in various fields.
Biomedical engineering. --- Biomedical materials. --- Biomimetics. --- Biomimicry. --- Biomimicry --- Biomedical engineering --- Health Occupations --- Biotechnology --- Biological Science Disciplines --- Disciplines and Occupations --- Natural Science Disciplines --- Biomedical Engineering --- Biomimetics --- Biology --- Health & Biological Sciences --- Biophysics --- Clinical engineering --- Medical engineering --- Bio-inspired engineering --- Physics. --- Biophysics. --- Biological physics. --- Nanotechnology. --- Biophysics and Biological Physics. --- Nanotechnology and Microengineering. --- Bioengineering --- Engineering --- Medicine --- Bionics --- Engineering. --- Biological and Medical Physics, Biophysics. --- Construction --- Industrial arts --- Technology --- Molecular technology --- Nanoscale technology --- High technology --- Biological physics --- Medical sciences --- Physics
Choose an application
Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each application and demonstrates that considering these applied problems as a similarity and classification problem enables techniques to be shared between areas. Additionally, the authors present in-depth case studies using the software similarity and classification techniques developed throughout the book.
Data protection. --- Malware (Computer software). --- Software engineering. --- Software protection. --- Engineering & Applied Sciences --- Computer Science --- Malware (Computer software) --- Computer software engineering --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software protection --- Protection of software --- Computer science. --- Computer security. --- Computers. --- Law and legislation. --- Computer Science. --- Systems and Data Security. --- Legal Aspects of Computing. --- Engineering --- Computer software --- Computers --- Access control --- Cyberspace --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Law and legislation --- Protection --- Security measures --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators
Choose an application
Sensor networks. --- Wireless communication systems. --- Sensor networks --- Wireless communication systems --- 681.3 *C2 --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Telecommunication systems --- Networks, Sensor --- Detectors --- Context-aware computing --- Multisensor data fusion --- 681.3 *C2 Computer communication networks: data communications; OSI; security and protection --- Computer communication networks: data communications; OSI; security and protection
Choose an application
Choose an application
This book covers some fundamental aspects and frontiers in non-equilibrium physics and soft matter research. Apart from the basic knowledge on nonlinear statistic physics, dynamics, computer simulations, and main approaches and emerging systems in soft matter research, particular attention is devoted to new conceptual flexible functional materials and the enriching areas, such as silk meso-molecular materials, molecular gels, liquid crystals, flexible electronics and new types of catalysis, etc. One of the main characteristics of this book is to start with the structure formation dynamics and the correlation between the structures and macroscopic performance. This lays down the foundation for the mesoscopic materials design and functionalization. The book is intended for upper undergraduate students, graduate students, and researchers who are interested in soft matter researches. As one of main references, the basic principles and technologies of computer simulations and experimental methods adopted in soft matter research are also explained. Illustrations and tables are included in this book to improve the readability, and examples and exercises are added to help understanding. .
Thermodynamics --- General biophysics --- Human biochemistry --- Materials sciences --- Biotechnology --- thermodynamica --- biologische materialen --- materiaalkennis --- medische biochemie --- biofysica --- bio-engineering --- biotechnologie
Choose an application
Choose an application
If you have to understand and optimize the performance of wireless ad hoc and sensor networks, this explanation provides you with the information and insights you need. It delivers an understanding of the underlying problems, and the techniques to develop efficient solutions and maximize network performance. Taking an algorithmic and theoretical approach, Li dissects key layers of a wireless network, from the physical and MAC layers (covering the IEEE 802.11 and 802.16 protocols, and protocols for wireless sensor networks and Bluetooth) through to the network routing layer. In doing so he reviews the practical protocols, formulates problems mathematically, solves them algorithmically and then analyses the performance. Graduate students, researchers and practitioners needing an overview of the various algorithmic, graph theoretical, computational geometric and probabilistic approaches to solving problems in designing these networks will find this an invaluable resource. Additional resources for this title are available online at www.cambridge.org/9780521865234.
Choose an application
This book constitutes the refereed proceedings of the 8th International Conference on Grid and Pervasive Computing, GPC 2016, held in Seoul, Korea, in May 2016. The 20 revised papers were carefully reviewed and selected from 94 submissions. The conference contains various aspects including green computing, cloud computing, virtualisation, data and storage, and network security.
Computer science. --- Computer communication systems. --- Software engineering. --- Algorithms. --- Information storage and retrieval. --- Computer Science. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Software Engineering. --- Information Storage and Retrieval. --- Algorithm Analysis and Problem Complexity. --- Informatics --- Algorism --- Computer software engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Science --- Algebra --- Arithmetic --- Engineering --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Distributed processing --- Information storage and retrieva. --- Computer software. --- Software, Computer --- Computer systems --- Information storage and retrieval systems. --- Automatic data storage --- Automatic information retrieval --- Automation in documentation --- Computer-based information systems --- Data processing systems --- Data storage and retrieval systems --- Discovery systems, Information --- Information discovery systems --- Information processing systems --- Information retrieval systems --- Machine data storage and retrieval --- Mechanized information storage and retrieval systems --- Electronic information resources --- Data libraries --- Digital libraries --- Information organization --- Information retrieval --- Cloud computing --- Web services --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer networks. --- Computer and Information Systems Applications. --- Data centers
Choose an application
This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks. The book subsequently tackles the issue of honeypot countermeasures, shows many of the tricks often used by hackers to discover honeypots, and proposes a counter-countermeasure to help conceal them. It then puts forward a new framework that integrates various novel concepts, and which can feasibly be used for the detection of potential ransomware and bitcoin. As such, the book provides non-experts with a concise guide to honeypots, and will also benefit practitioners working on security systems.
Computer security. --- Malware (Computer software) --- Prevention. --- Computer science. --- Computer organization. --- Computer science --- Computer simulation. --- Computer Science. --- Security. --- Computer Systems Organization and Communication Networks. --- Systems and Data Security. --- Applications of Graph Theory and Complex Networks. --- Math Applications in Computer Science. --- Simulation and Modeling. --- Mathematics. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer code, Malicious --- Malevolent software --- Malicious computer code --- Malicious software --- Software, Malevolent --- Software, Malicious --- Computer software --- Data protection. --- Computer network architectures. --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- Informatics --- Science --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Physics. --- Computer science—Mathematics. --- Natural philosophy --- Philosophy, Natural --- Physical sciences --- Dynamics --- Organization, Computer
Listing 1 - 10 of 66 | << page >> |
Sort by
|