This 2-volume set constitutes the refereed proceedings of 1st International Conference on Robotics and Rehabilitation Intelligence, ...
اقرأ المزيدThis 2-volume set constitutes the refereed proceedings of 1st International Conference on Robotics and Rehabilitation Intelligence, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 5th International Conference on Rough Sets and Current Trends in Computing, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the International Conference on Rough Sets and Emerging Intelligent Systems ...
اقرأ المزيدThis volume contains the papers selected for presentation at the First Int- national Conference on Rough Sets and Knowledge ...
اقرأ المزيدThis book focus on five major research fields: computing theory and paradigms, knowledge technology, intelligent information ...
اقرأ المزيدThe main idea is based on indiscernibility relations that describe indistinguishability of objects. Concepts are represented ...
اقرأ المزيدThe main idea is based on indiscernibility relations that describe indistinguishability of objects. Concepts are represented ...
اقرأ المزيدThis book provides an overview of the field and introduces a number of different approaches to extracting rules from support ...
اقرأ المزيدThis book offers a comprehensive introduction to learning classifier systems (LCS) – or more generally, rule-based evolutionary ...
اقرأ المزيدRuntime verification is a recent direction in formal methods research, which is complementary to such well-established formal ...
اقرأ المزيدThe subject material of this book is largely unknown, but of great interest to engineers and scientists, mechanics, and historians ...
اقرأ المزيدThe volume Scalable Optimization via Probabilistic Modeling: From Algorithms to Applications is a worthy addition to your ...
اقرأ المزيدThis book constitutes the refereed proceedings of the First International Conference on Scalable Uncertainty Management, ...
اقرأ المزيدThis book trains the next generation of scientists representing different disciplines to leverage the data generated during ...
اقرأ المزيدData science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
اقرأ المزيدExamines various topics and approaches related to the security and privacy in big data and cloud computing, where authors ...
اقرأ المزيدThis book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social ...
اقرأ المزيدThis book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located ...
اقرأ المزيدThis book is open access under a CC BY license. Selfies, blogs and lifelogging devices help us understand ourselves, building ...
اقرأ المزيد