Soft Computing admits approximate reasoning, imprecision, uncertainty and partial truth in order to mimic aspects of the ...
Lire la suiteThis book includes spatial orientation, spatial navigation, spatial learning, maps and modalities, spatial communication, ...
Lire la suiteThis book gives a comprehensive and up-to-date account of the optimisation approach to shape correspondence, and the question ...
Lire la suiteThis book constitutes the refereed proceedings of the 11th International Workshop on Structural and Syntactic Pattern Recognition, ...
Lire la suiteThis book includes : graph-based methods, probabilistic and stochastic structural models for PR, image and video analysis, ...
Lire la suiteThis book was inspired by the last argument and resulted from the workshop on Supervised and Unsupervised Ensemble Methods ...
Lire la suiteThis book explains the principles that make support vector machines (SVMs) a successful modelling and prediction tool for ...
Lire la suiteThe support vector machine (SVM) has become one of the standard tools for machine learning and data mining. This carefully ...
Lire la suiteA concise and accessible introduction to the science and applications of text analytics (or text mining), which enables automatic ...
Lire la suiteThis volume presents the results of the Neural Information Processing Systems Competition track at the 2018 NeurIPS conference. ...
Lire la suiteToday’s mobile robot perception is insufficient for acting goal-directedly in unconstrained, dynamic everyday environments ...
Lire la suiteThis, the 37th issue of the Transactions on Computational Science, is devoted to the area of Computer Graphics. The 9 papers ...
Lire la suiteThe field of computer vision has developed significantly over the last several years and the application areas span a broad ...
Lire la suiteTthis volume are organized in topical sections on data acquisition and modelling, visualization methods / audio, sensors ...
Lire la suiteThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Lire la suiteNetworked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
Lire la suiteThis book includs but not limited to Conceptual and logical models, Data management and retrieval, Geographical search engines, ...
Lire la suiteIt is not just a theoretical exploration of smart cities. It goes beyond that by providing an in-depth look at the key technologies ...
Lire la suite