This volume constitutes the refereed proceedings of the 5th Multi-disciplinary International Workshop On Artificial Intelligence, MIWAI 2011, held in Hyderabad, India, in December 2011. The 38 revised
This book constitutes the refereed proceedings of the 12th International Conference of the Italian Association for Artificial Intelligence, AI*IA 2011, held in Palermo, Italy, in September 2011. The 3
This reader-friendly textbook presents a comprehensive review of the essentials of image data mining, and the latest cutting-edge techniques used in the field. The coverage spans all aspects of image
This book discusses soft computing, which provides an efficient platform to deal with imprecision, uncertainty, vagueness and approximation in order to attain robustness and reliable computing. It exp
This book constitutes the proceedings of the 14th International Conference on Green, Pervasive, and Cloud Computing, GPC 2019, held in Uberlândia, Brazil, in May 2019.The 17 full papers included in th
This book presents the latest research on hierarchical deep learning for multi-modal sentiment analysis. Further, it analyses sentiments in Twitter blogs from both textual and visual content using hie
This book constitutes revised selected papers from the 6th International Conference on Robot Intelligence Technology and Applications, RiTA 2018, held in Putrajaya, Malaysia, in December 2018.The 20 f
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-as
This book presents a comprehensive overview of fundamental issues and recent advances in graph data management. Its aim is to provide beginning researchers in the area of graph data management,
This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which include
The three-volume set of LNCS 11272, 11273, and 11274 constitutes the refereed proceedings of the 24th International Conference on the Theory and Application of Cryptology and Information Security, ASI
Advancements in microprocessor architecture, interconnection technology, and software development have fueled rapid growth in parallel and distributed computing. However, this development is only of p
This book constitutes the refereed proceedings of the 10th IFIP TC 12 International Conference on Intelligent Information Processing, IIP 2018, held in Nanning, China, in October 2018. The 37 f
This book explores answers to the fundamental questions driving the research, innovation and practices of the latest revolution in scientific, technological and economic development: how does data sci
This book constitutes the refereed proceedings of the Third International Joint Conference on Electronic Voting, E-Vote-ID 2018, held in Bregenz, Austria, in October 2018.The 13 full papers presented
This book constitutes revised selected papers from the 16th Workshop on e-Business, WeB 2017, which took place in Seoul, South Korea, in December 2017. The purpose of WeB is to provide an open forum
This book offers a gentle motivation and introduction to computational thinking, in particular to algorithms and how they can be coded to solve significant, topical problems from domains such as finan
This book highlights the applications of soft computing techniques in medical bioinformatics. It reflects the state-of-the-art research in soft computing and bioinformatics, including theory, algorith
This book provides a collection of high-quality research works that address broad challenges in both theoretical and applied aspects of dynamic wireless sensor networks (WSNs) for intelligent and smar
This book summarizes what is currently known about gravity sensing and response mechanisms in microorganisms, fungi, lower and higher plants; starting from the historical eye-opening experiments from
This easy-to-understand textbook presents a modern approach to learning numerical methods (or scientific computing), with a unique focus on the modeling and applications of the mathematical content. E
This two-volume set, LNCS 10987 and 10988, constitutes the thoroughly refereed proceedings of the Second International Joint Conference, APWeb-WAIM 2018, held in Macau, China in July 2018.The 40
This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018. The 12 fu
This SpringerBrief explains the importance of Maillard reactions in food processing. It underlines that the term “Maillard reaction” actually does not describe one single chemical reaction, but an ent
A 3D user interface (3DUI) is an interface in which the user performs tasks in three dimensions. For example, interactions using hand/body gestures, interaction using a motion controller (e.g. Sony Pl
Many different fractal dimensions have been proposed for networks. In A Survey of Fractal Dimensions of Networks the theory and computation of the most important of these dimensions are reviewed, incl
Everyone expects the products and services they use to be secure, but 'building security in' at the earliest stages of a system's design also means designing for use as well. Software that is unusable
At the intersection of astronautics, computer science, and social science, this book introduces the challenges and insights associated with computer simulation of human society in outer space, and of
This book constitutes the refereed proceedings of the First International Conference on Blockchain, ICBC 2018, held as part of the Services Conference Federation, SCF 2018, in Seattle, USA, in June 20
This two-volume set LNCS 10915 and 10916 constitutes the refereed proceedings of the 12h International Conference on Augmented Cognition, AC 2018, held as part of the 20th International Conference on
This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in Septem
This book contains selected papers presented at the 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Ispra, Italy, in September 2
With an evolutionary advancement of Machine Learning (ML) algorithms, a rapid increase of data volumes and a significant improvement of computation powers, machine learning becomes hot in different ap
This two volume set LNAI 10947 and LNAI 10948 constitutes the proceedings of the 19th International Conference on Artificial Intelligence in Education, AIED 2018, held in London, UK, in June 2018.The
The book covers a wide range of wireless communication and network technologies, and will help readers understand the role of wireless technologies in applications touching on various spheres of human
This two volume set LNAI 10947 and LNAI 10948 constitutes the proceedings of the 19th International Conference on Artificial Intelligence in Education, AIED 2018, held in London, UK, in June 2018.The
This three-volume set, LNAI 10937, 10938, and 10939, constitutes the thoroughly refereed proceedings of the 22nd Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2018,
This volume constitutes the proceedings of the 16th International Conference on Web Services, ICWS 2018, held as Part of SCF 2018 in Seattle, WA, USA in June 2018. The 31 full papers together with 1
This book constitutes the proceedings of the 16th International Conference on Smart Homes and Health Telematics, ICOST 2018, held in Singapore, Singapore, in July 2018. The theme of this year volume i