Total Books: 1279 - 1296 / 3461
Total Books: 1279 - 1296 / 3461
Agile processes in software engineering and extreme programming : XP 2022 workshops, Copenhagen, Denmark, June 13-17, 2022 and XP 2023 workshops, Amsterdam, the Netherlands, June 13-16, 2023 : revised selected papers
Book constitutes papers from the research workshops presented at XP 2022 and XP 2023, respectively the 23rd and 24th International Conferences on Agile Software Development, held on June 13-17, 2022 at the IT University of Copenhagen, Denmark and June 13-16, 2023 in Amsterdam, Netherlands.
Agile Development with the ICONIX Process : People, Process, and Pragmatism
Describes how to apply ICONIX Process (a minimal, use case-driven modeling process) in an agile software project. It's full of practical advice for avoiding common agile pitfalls. Further, the book defines a core agile subset so those of you who want to get agile need not spend years learning to do it. Instead, you can simply read this book and apply the core subset of techniques. The book follows a real-life .NET/C# project from inception and UML modeling, to working code through several iterations. You can then go on-line to compare the finished product with the initial set of use cases. The book also introduces several extensions to the core ICONIX Process, including combining test-driven development (TDD) with up-front design to maximize both approaches (with examples using Java and JUnit). And the book incorporates persona analysis to drive the projects goals and reduce requirements churn.
Agent-based Supply Network Event Management
Supply Chain Event Management (SCEM)" is one of the major topics in application-oriented Supply Chain Management. However, many solutions lack conceptual precision and currently available client-server SCEM-systems are ill-suited for complex supply networks in today's business environment,In this book a thorough analysis of the event management problem domain is the starting point to develop a generic agent-based approach to Supply Network Event Management. The concept is illustrated with prototypical implementations and assessed in a multi-dimensional evaluation of potential benefits. The main focus lies on practical issues of event management (e.g. semantic interoperability) and economic benefits to be achieved with agent technology in this state-of-the-art problem domain.
Agent Technology from a Formal Perspective
The field of agent & multi-agent systems is experiencing tremendous growth. At the same time the field of formal methods is blossoming and has proven its importance in industrial and government applications. The FAABS (Formal Approaches to Agent-Based Systems) workshops, merging the concerns of the two fields, provided a timely and compelling platform on which the growing concerns and requirement of agent-based systems users that systems should be accompanied by behavioral assurances, could be discussed. This book has arisen from the overwhelming response to FAABS ’00, ’02 & ’04 and all chapters are updated or represent new research, and are designed to provide a more in-depth treatment of the topic. Examples of how others have applied formal methods to agent-based systems are included, plus formal method tools & techniques that readers can apply to their own systems.
Agent Technology and e-Health
Multi-agent systems are one of the most exciting research areas in Artificial Intelligence. This book reports on the results achieved in this area, discusses the benefits (and drawbacks) that agent-based systems may bring to medical domains and society.
Agent Intelligence Through Data Mining
AGENT INTELLIGENCE THROUGH DATA MINING offers a self-contained overview of a relatively young but important area of research: the intersection of agent technology and data mining. This intersection leads to considerable advancements in the area of information technologies, drawing the increasing attention of both research and industrial communities. It can take two forms: a) the more mundane use of intelligent agents for improved data mining and; b) the use of data mining for smarter, more efficient agents. The second approach is the main focus of this volume. this book presents a methodology for developing multi-agent systems, describes available open-source tools to support this process, and demonstrates the application of the methodology on three different cases. AGENT INTELLIGENCE THROUGH DATA MINING is designed for a professional audience composed of researchers and practitioners in industry.
Affect and Emotion in Human-Computer Interaction : From Theory to Applications
The present book provides an account of the latest work on a variety of aspects related to affect and emotion in human-technology interaction. It covers theoretical issues, user experience and design aspects as well as sensing issues, and reports on a number of affective applications that have been developed in recent years.
Advancing Social Simulation: The First World Congress
Agent-based modeling and social simulation have emerged as both developments of and challenges to the social sciences. The developments include agent-based computational economics and investigations of theoretical sociological concepts using formal simulation techniques. Among the challenges are the development of qualitative modeling techniques, implementation of agent-based models to investigate phenomena for which conventional economic, social, and organizational models have no face validity, and the application of physical modeling techniques to social processes. Bringing together diverse approaches to social simulation and research agendas.
Advancing Computational Intelligence Techniques for Security Systems Design
Security systems have become an integral part of the building and large complex setups, and intervention of the computational intelligence (CI) paradigm plays an important role in security system architecture. This book covers both theoretical contributions and practical applications in security system design by applying the Internet of Things (IoT) and CI. It further explains the application of IoT in the design of modern security systems and how IoT blended with computational intel- ligence can make any security system improved and realizable. Focuses on the computational intelligence techniques of security system design / Covers applications and algorithms of discussed computational intelligence techniques / Includes convergence-based and enterprise integrated security systems with their applications / Explains emerging laws, policies, and tools affecting the landscape of cyber security / Discusses application of sensors toward the design of security systems
Advances in web mining and web usage analysis ; 6th International workshop on knowledge discovery on the web, WEBKDD 2004, Seattle, WA, USA, August 22-25, 2004, Revised Selected Papers
The Webisaliveenvironmentthatmanagesanddrivesawidespectrumofapp- cations in which a user may interact with a company, a governmental authority, a non-governmental organization or other non-pro?t institution or other users. User preferences and expectations, together with usage patterns, form the basis for personalized, user-friendly and business-optimal services. Key Web business metrics enabled by proper data capture and processing are essential to run an e?ective business or service. Enabling technologies include data mining, sc- able warehousing and preprocessing, sequence discovery, real time processing, document classi?cation, user modeling and quality evaluation models for them. Recipient technologies required for user pro?ling and usage patterns include recommendation systems, Web analytics applications, and application servers, coupled with content management systems and fraud detectors.
Advances in UAV detection, classification and tracking
Explores the latest techniques and advancements in unmanned aerial vehicle (UAV) detection, classification, and tracking. As UAV technology continues to evolve and become more accessible, there is a growing need for effective methods to detect, identify, and track these devices in various scenarios. This reprint provides a thorough overview of the state-of-the-art approaches for UAV detection, classification, and tracking, covering both theoretical and practical aspects.The reprint begins by introducing the basics of UAVs and their various applications, followed by a detailed overview of the challenges associated with UAV detection, classification, and tracking. The authors then present the latest techniques and algorithms used in the field, including machine-learning-based approaches, computer vision techniques, and sensor fusion techniques. The reprint also covers the challenges of real-world applications, such as dealing with occlusions, sensor noise, and environmental factors.
Advances in radar systems for target detection and tracking
Radar systems can provide the all-weather and all-time detection and tracking of targets of interest, and they have been extensively applied by the remote sensing community, in applications such as geological exploration, disaster forecasting, traffic monitoring, urban planning, environmental sciences, hydrology, littoral zones, oceans, etc. This reprint contains the several advance research studies on radar systems for target detection and tracking. It includes multipath ghost suppression, maneuvering target tracking, target detection, and other topics.
Advances in proof-theoretic semantics
This volume is the first ever collection devoted to the field of proof-theoretic semantics. Contributions address topics including the systematics of introduction and elimination rules and proofs of normalization, the categorial characterization of deductions, the relation between Heyting's and Gentzen's approaches to meaning, knowability paradoxes, proof-theoretic foundations of set theory, Dummett's justification of logical laws, Kreisel's theory of constructions, paradoxical reasoning, and the defence of model theory.
Advances in Production Technology
This edited volume contains the selected papers presented at the scientific board meeting of the German Cluster of Excellence on “Integrative Production Technology for High-Wage Countries”, held in November 2014. The topical structure of the book is clustered in six sessions: Integrative Production Technology, Individualised Production, Virtual Production Systems, Integrated Technologies, Self-Optimising Production Systems and Human Factors in Production Technology. The Aachen perspective on a holistic theory of production is complemented by conference papers from external leading researchers in the fields of production, materials science and bordering disciplines.
Advances in pervasive computing and networking
"Pervasive Computing and Networking aim at providing ubiquitous, ever-present, adaptable, smart, enveloping and immersive environments in which computing components and humans can interact regardless of the location. The combination of an abundance of computational power of the processors and the communication bandwidth provided by the wireless and mobile networking everywhere and all the time makes such environments within the reach of current technology. Yet, to realize the full potential of such environments, many technical and economical challenges needs to be overcome. These challenges and the perspective on the seminal directions of the research in this area were the subject of the Workshop for Pervasive Computing and Networking at Rensselaer Polytechnic Institute, Troy, NY, USA.
Advances in optical fiber communications
Given the increasing importance of a globally interconnected world, driven by modern digital services and the need for fast and reliable access to digital resources, communication networks are one of the key infrastructures in today’s society. In this scenario, fiber optics and optical devices play a leading role, as they allow for unprecedented growth in our capacity to cope with the ever-increasing traffic demand. Optical transmission solutions range from high-speed networks based on coherent detection and advanced modulation formats for long-haul-level communications, to networks still relying on traditional intensity modulation and direct detection receivers for short-reach communications, down to intra-data center scenarios.
Advances in Metaheuristics for Hard Optimization
The book gathers contributions related to the following topics: theoretical developments in metaheuristics; adaptation of discrete metaheuristics to continuous optimization; performance comparisons of metaheuristics; cooperative methods combining different approaches; parallel and distributed metaheuristics for multiobjective optimization; software implementations; and real-world applications.
Advances in Information Processing and Protection
This book contains a selection of the best papers given at the international Advanced Computer Systems Conference in October 2006 in Miedzyzdroje, Poland. Combining research areas from both Computer Science and Industrial Management.
Total Books: 1279 - 1296 / 3461

















