Soft Computing admits approximate reasoning, imprecision, uncertainty and partial truth in order to mimic aspects of the ...
WeiterlesenThis book includes spatial orientation, spatial navigation, spatial learning, maps and modalities, spatial communication, ...
WeiterlesenThis book gives a comprehensive and up-to-date account of the optimisation approach to shape correspondence, and the question ...
WeiterlesenThis book constitutes the refereed proceedings of the 11th International Workshop on Structural and Syntactic Pattern Recognition, ...
WeiterlesenThis book includes : graph-based methods, probabilistic and stochastic structural models for PR, image and video analysis, ...
WeiterlesenThis book was inspired by the last argument and resulted from the workshop on Supervised and Unsupervised Ensemble Methods ...
WeiterlesenThis book explains the principles that make support vector machines (SVMs) a successful modelling and prediction tool for ...
WeiterlesenThe support vector machine (SVM) has become one of the standard tools for machine learning and data mining. This carefully ...
WeiterlesenA concise and accessible introduction to the science and applications of text analytics (or text mining), which enables automatic ...
WeiterlesenThis volume presents the results of the Neural Information Processing Systems Competition track at the 2018 NeurIPS conference. ...
WeiterlesenToday’s mobile robot perception is insufficient for acting goal-directedly in unconstrained, dynamic everyday environments ...
WeiterlesenThis, the 37th issue of the Transactions on Computational Science, is devoted to the area of Computer Graphics. The 9 papers ...
WeiterlesenThe field of computer vision has developed significantly over the last several years and the application areas span a broad ...
WeiterlesenTthis volume are organized in topical sections on data acquisition and modelling, visualization methods / audio, sensors ...
WeiterlesenThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
WeiterlesenNetworked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
WeiterlesenThis book includs but not limited to Conceptual and logical models, Data management and retrieval, Geographical search engines, ...
WeiterlesenIt is not just a theoretical exploration of smart cities. It goes beyond that by providing an in-depth look at the key technologies ...
Weiterlesen