Browse Results

Showing 27,601 through 27,625 of 53,677 results

IoT as a Service: 6th EAI International Conference, IoTaaS 2020, Xi’an, China, November 19–20, 2020, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #346)

by Bo Li Changle Li Mao Yang Zhongjiang Yan Jie Zheng

This book constitutes the refereed post-conference proceedings of the 6st International Conference on IoT as a Service, IoTaaS 2020, which took place in Xi’an, China, in November 2020. Due to COVID-19 pandemic the conference was held virtually. The 69 revised full papers were carefully reviewed and selected from 136 submissions. The papers present two technical tracks and three workshops: The Second Workshop on Edge Intelligence and Computing for Iot Communications and Applications, the Workshop on Satellite Communication Networks for Internet of Things, the Workshop on Satellite Communications

IoT as a Service: 4th EAI International Conference, IoTaaS 2018, Xi’an, China, November 17–18, 2018, Proceedings (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering #271)

by Bo Li Mao Yang Hui Yuan Zhongjiang Yan

This book constitutes the refereed post-conference proceedings of the Fourth International Conference on IoT as a Service, IoTaaS 2018, which took place in Xi’an, China, in November 2018. The 50 revised full papers were carefully reviewed and selected from 83 submissions. The technical track present IoT-based services in various applications. In addition, there are three workshops: international workshop on edge computing for 5G/IoT, international workshop on green communications for internet of things, and international workshop on space-based internet of things.

Advanced Data Mining and Applications: 17th International Conference, ADMA 2021, Sydney, NSW, Australia, February 2–4, 2022, Proceedings, Part II (Lecture Notes in Computer Science #13088)

by Bohan Li Lin Yue Jing Jiang Weitong Chen Xue Li Guodong Long Fei Fang Han Yu

This book constitutes the proceedings of the 17th International Conference on Advanced Data Mining and Applications, ADMA 2021, held in Sydney, Australia in February 2022.*The 26 full papers presented together with 35 short papers were carefully reviewed and selected from 116 submissions. The papers were organized in topical sections in Part II named: Pattern mining; Graph mining; Text mining; Multimedia and time series data mining; and Classification, clustering and recommendation. * The conference was originally planned for December 2021, but was postponed to 2022.

Advanced Data Mining and Applications: 17th International Conference, ADMA 2021, Sydney, NSW, Australia, February 2–4, 2022, Proceedings, Part I (Lecture Notes in Computer Science #13087)

by Bohan Li Lin Yue Jing Jiang Weitong Chen Xue Li Guodong Long Fei Fang Han Yu

This book constitutes the proceedings of the 17th International Conference on Advanced Data Mining and Applications, ADMA 2021, held in Sydney, Australia in February 2022.*The 26 full papers presented together with 35 short papers were carefully reviewed and selected from 116 submissions. The papers were organized in topical sections in Part I, including: Healthcare, Education, Web Application and On-device application. * The conference was originally planned for December 2021, but was postponed to 2022.

Web and Big Data: 6th International Joint Conference, APWeb-WAIM 2022, Nanjing, China, November 25–27, 2022, Proceedings, Part I (Lecture Notes in Computer Science #13421)

by Bohan Li Lin Yue Chuanqi Tao Xuming Han Diego Calvanese Toshiyuki Amagasa

This three-volume set, LNCS 13421, 13422 and 13423, constitutes the thoroughly refereed proceedings of the 6th International Joint Conference, APWeb-WAIM 2022, held in Nanjing, China, in August 2022.The 75 full papers presented together with 45 short papers, and 5 demonstration papers were carefully reviewed and selected from 297 submissions. The papers are organized around the following topics: Big Data Analytic and Management, Advanced database and web applications, Cloud Computing and Crowdsourcing, Data Mining, Graph Data and Social Networks, Information Extraction and Retrieval, Knowledge Graph, Machine Learning, Query processing and optimization, Recommender Systems, Security, privacy, and trust and Blockchain data management and applications, and Spatial and multi-media data.

Advanced Parallel Processing Technologies: 15th International Symposium, APPT 2023, Nanchang, China, August 4–6, 2023, Proceedings (Lecture Notes in Computer Science #14103)

by Chao Li Zhenhua Li Li Shen Fan Wu Xiaoli Gong

This book constitutes the refereed proceedings of the 15th International Symposium on Advanced Parallel Processing Technologies, APPT 2023, held in Nanchang, China, during August 4–6, 2023.The 23 full papers and 1 short papers included in this book were carefully reviewed and selected from 49 submissions. They were organized in topical sections as follows: High Performance Computing and Parallelized Computing, Storage Systems and File Management, Networking and Cloud Computing, Computer Architecture and Hardware Acceleration, Machine Learning and Data Analysis, Distinguished Work from Student Competition.

Advanced Computer Architecture: 10th Annual Conference, Aca 2014, Shenyang, China, August 23-24, 2014. Proceedings (Communications In Computer And Information Science #451)

by Chao Li Junjie Wu

This book constitutes the refereed proceedings of the 12th Annual Conference on Advanced Computer Architecture, ACA 2018, held in Yingkou, China, in August 2018. The 17 revised full papers presented were carefully reviewed and selected from 80 submissions. The papers of this volume are organized in topical sections on: accelerators; new design explorations; towards efficient ML/AI; parallel computing system.

Blended Learning: 16th International Conference on Blended Learning, ICBL 2023, Hong Kong, China, July 17-20, 2023, Proceedings (Lecture Notes in Computer Science #13978)

by Chen Li Simon K. S. Cheung Fu Lee Wang Angel Lu Lam For Kwok

This book constitutes the refereed proceedings of the 16th International Conference on Blended Learning, ICBL 2023, held in Hong Kong, China, on July 17-20, 2023. The 24 papers presented in this volume were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections named: smart classroom and digital literacy; online and distant learning; content and pedagogy development for blended learning; gamification and lnteractive learning snvironment; learning analytics and big data in education.

Advances in Engineering Design and Simulation: Select Proceedings of NIRC 2018 (Lecture Notes on Multidisciplinary Industrial Engineering)

by Chenfeng Li U. Chandrasekhar Godfrey Onwubolu

This book consists of selected peer-reviewed papers presented at the NAFEMS India Regional Conference (NIRC 2018). It covers current topics related to advances in computer aided design and manufacturing. The book focuses on the latest developments in engineering modelling and simulation, and its application to various complex engineering systems. Finite element method/finite element analysis, computational fluid dynamics, and additive manufacturing are some of the key topics covered in this book. The book aims to provide a better understanding of contemporary product design and analyses, and hence will be useful for researchers, academicians, and professionals.

SRv6 Network Programming: Ushering in a New Era of IP Networks (Data Communication Series)

by Cheng Li Zhenbin Li Zhibo Hu

SRv6 Network Programming, beginning with the challenges for Internet Protocol version 6 (IPv6) network development, describes the background, roadmap design, and implementation of Segment Routing over IPv6 (SRv6), as well as the application of this technology in traditional and emerging services. The book begins with the development of IP technologies by focusing on the problems encountered during MPLS and IPv6 network development, giving readers insights into the problems tackled by SRv6 and the value of SRv6. It then goes on to explain SRv6 fundamentals, including SRv6 packet header design, the packet forwarding process, protocol extensions such as Interior Gateway Protocol (IGP), Border Gateway Protocol (BGP), and Path Computation Element Protocol (PCEP) extensions, and how SRv6 supports existing traffic engineering (TE), virtual private networks (VPN), and reliability requirements. Next, SRv6 network deployment is introduced, covering the evolution paths from existing networks to SRv6 networks, SRv6 network deployment processes, involved O&M technologies, and emerging 5G and cloud services supported by SRv6. Bit Index Explicit Replication IPv6 encapsulation (BIERv6), an SRv6 multicast technology, is then introduced as an important supplement to SRv6 unicast technology. The book concludes with a summary of the current status of the SRv6 industry and provides an outlook for new SRv6-based technologies. SRv6 Network Programming: Ushering in a New Era of IP Networks collects the research results of Huawei SRv6 experts and reflects the latest development direction of SRv6. With rich, clear, practical, and easy-to-understand content, the volume is intended for network planning engineers, technical support engineers and network administrators who need a grasp of the most cutting-edge IP network technology. It is also intended for communications network researchers in scientific research institutions and universities. Authors: Zhenbin Li is the Chief Protocol Expert of Huawei and member of the IETF IAB, responsible for IP protocol research and standards promotion at Huawei. Zhibo Hu is a Senior Huawei Expert in SR and IGP, responsible for SR and IGP planning and innovation. Cheng Li is a Huawei Senior Pre-research Engineer and IP standards representative, responsible for Huawei's SRv6 research and standardization.

Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies

by Chong Li Meikang Qiu

Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs). Rooted in behavioral psychology, RL is one of the primary strands of machine learning. Different from other machine learning algorithms, such as supervised learning and unsupervised learning, the key feature of RL is its unique learning paradigm, i.e., trial-and-error. Combined with the deep neural networks, deep RL become so powerful that many complicated systems can be automatically managed by AI agents at a superhuman level. On the other hand, CPSs are envisioned to revolutionize our society in the near future. Such examples include the emerging smart buildings, intelligent transportation, and electric grids. However, the conventional hand-programming controller in CPSs could neither handle the increasing complexity of the system, nor automatically adapt itself to new situations that it has never encountered before. The problem of how to apply the existing deep RL algorithms, or develop new RL algorithms to enable the real-time adaptive CPSs, remains open. This book aims to establish a linkage between the two domains by systematically introducing RL foundations and algorithms, each supported by one or a few state-of-the-art CPS examples to help readers understand the intuition and usefulness of RL techniques. Features Introduces reinforcement learning, including advanced topics in RL Applies reinforcement learning to cyber-physical systems and cybersecurity Contains state-of-the-art examples and exercises in each chapter Provides two cybersecurity case studies Reinforcement Learning for Cyber-Physical Systems with Cybersecurity Case Studies is an ideal text for graduate students or junior/senior undergraduates in the fields of science, engineering, computer science, or applied mathematics. It would also prove useful to researchers and engineers interested in cybersecurity, RL, and CPS. The only background knowledge required to appreciate the book is a basic knowledge of calculus and probability theory.

Theory and Applications of Satisfiability Testing – SAT 2021: 24th International Conference, Barcelona, Spain, July 5-9, 2021, Proceedings (Lecture Notes in Computer Science #12831)

by Chu-Min Li Felip Manyà

This book constitutes the proceedings of the 24th International Conference on Theory and Applications of Satisfiability Testing, SAT 2021, which took place in Barcelona, Spain, in July 2021.The 37 full papers presented in this volume were carefully reviewed and selected from 73 submissions. They deal with theory and applications of the propositional satisfiability problem, broadly construed. Aside from plain propositional satisfiability, the scope of the meeting includes Boolean optimization, including MaxSAT and pseudo-Boolean (PB) constraints, quantified Boolean formulas (QBF), satisfiability modulo theories (SMT), and constraint programming (CP) for problems with clear connections to Boolean reasoning.

Building Enterprise JavaScript Applications: Learn to build and deploy robust JavaScript applications using Cucumber, Mocha, Jenkins, Docker, and Kubernetes

by Daniel Li

Become a senior developer by building enterprise applications that use modern techniques such as TDD, containerization, continuous integration, and deploymentKey FeaturesCreate production-grade JavaScript applications from scratchBuild microservices and deploy them to a Docker container for scaling applicationsTest and deploy your code with confidence using Travis CIBook DescriptionWith the over-abundance of tools in the JavaScript ecosystem, it's easy to feel lost. Build tools, package managers, loaders, bundlers, linters, compilers, transpilers, typecheckers - how do you make sense of it all?In this book, we will build a simple API and React application from scratch. We begin by setting up our development environment using Git, yarn, Babel, and ESLint. Then, we will use Express, Elasticsearch and JSON Web Tokens (JWTs) to build a stateless API service. For the front-end, we will use React, Redux, and Webpack.A central theme in the book is maintaining code quality. As such, we will enforce a Test-Driven Development (TDD) process using Selenium, Cucumber, Mocha, Sinon, and Istanbul. As we progress through the book, the focus will shift towards automation and infrastructure. You will learn to work with Continuous Integration (CI) servers like Jenkins, deploying services inside Docker containers, and run them on Kubernetes.By following this book, you would gain the skills needed to build robust, production-ready applications.What you will learnPractice Test-Driven Development (TDD) throughout the entire bookUse Cucumber, Mocha and Selenium to write E2E, integration, unit and UI testsBuild stateless APIs using Express and ElasticsearchDocument your API using OpenAPI and SwaggerBuild and bundle front-end applications using React, Redux and WebpackContainerize services using DockerDeploying scalable microservices using KubernetesWho this book is forIf you're a JavaScript developer looking to expand your skillset and become a senior JavaScript developer by building production-ready web applications, then this book is for you.

Instant BrainShark

by Daniel Li

Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. "Instant BrainShark" is a step-by-step guide to creating online presentations using BrainShark. The book covers digital marketing best practices alongside tips for sales conversions. The book is written in an easy-to-read style for anybody to easily pick up and get started with BrainShark.Instant BrainShark is for anyone who wants to use BrainShark to create presentations online and share them around the community. The book is also useful for developers who are looking to explore BrainShark as a possible way to market their existing presentations or podcasts.

Mastering Grunt

by Daniel Li

This easy-to-understand tutorial provides you with several engaging projects that show you how to utilize Grunt with various web technologies, teaching you how to master build automation and testing with Grunt in your applications. If you are a JavaScript developer who is looking to streamline their workflow with build-automation, then this book will give you a kick start in fully understanding the importance of the described web technologies and automate their processes using Grunt.

Computer and Computing Technologies in Agriculture X: 10th IFIP WG 5.14 International Conference, CCTA 2016, Dongying, China, October 19–21, 2016, Proceedings (IFIP Advances in Information and Communication Technology #509)

by Daoliang Li

This book constitutes the refereed post-conference proceedings of the 10th IFIP WG 5.14 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2016, held in Dongying, China, in October 2016. The 55 revised papers presented were carefully reviewed and selected from 128 submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including intelligent sensing, cloud computing, key technologies of the Internet of Things, precision agriculture, animal husbandry information technology, including Internet + modern animal husbandry, livestock big data platform and cloud computing applications, intelligent breeding equipment, precision production models, water product networking and big data , including fishery IoT, intelligent aquaculture facilities, and big data applications.

Computer and Computing Technologies in Agriculture XI (IFIP Advances in Information and Communication Technology #545)

by Daoliang Li Chunjiang Zhao

The two volumes IFIP AICT 545 and 546 constitute the refereed post-conference proceedings of the 11th IFIP WG 5.14 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2017, held in Jilin, China, in August 2017. The 100 revised papers included in the two volumes were carefully reviewed and selected from 282 submissions. They cover a wide range of interesting theories and applications of information technology in agriculture. The papers focus on four topics: Internet of Things and big data in agriculture, precision agriculture and agricultural robots, agricultural information services, and animal and plant phenotyping for agriculture.

Computer and Computing Technologies in Agriculture XI: 11th IFIP WG 5.14 International Conference, CCTA 2017, Jilin, China, August 12-15, 2017, Proceedings, Part II (IFIP Advances in Information and Communication Technology #546)

by Daoliang Li Chunjiang Zhao

The two volumes IFIP AICT 545 and 546 constitute the refereed post-conference proceedings of the 11th IFIP WG 5.14 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2017, held in Jilin, China, in August 2017.The 100 revised papers included in the two volumes were carefully reviewed and selected from 282 submissions. They cover a wide range of interesting theories and applications of information technology in agriculture. The papers focus on four topics: Internet of Things and big data in agriculture, precision agriculture and agricultural robots, agricultural information services, and animal and plant phenotyping for agriculture.

Decision and Game Theory in Management With Intuitionistic Fuzzy Sets

by Deng-Feng Li

The focus of this book is on establishing theories and methods of both decision and game analysis in management using intuitionistic fuzzy sets. It proposes a series of innovative theories, models and methods such as the representation theorem and extension principle of intuitionistic fuzzy sets, ranking methods of intuitionistic fuzzy numbers, non-linear and linear programming methods for intuitionistic fuzzy multi-attribute decision making and (interval-valued) intuitionistic fuzzy matrix games. These theories and methods form the theory system of intuitionistic fuzzy decision making and games, which is not only remarkably different from those of the traditional, Bayes and/or fuzzy decision theory but can also provide an effective and efficient tool for solving complex management problems. Since there is a certain degree of inherent hesitancy in real-life management, which cannot always be described by the traditional mathematical methods and/or fuzzy set theory, this book offers an effective approach to using the intuitionistic fuzzy set expressed with membership and non-membership functions. This book is addressed to all those involved in theoretical research and practical applications from a variety of fields/disciplines: decision science, game theory, management science, fuzzy sets, operational research, applied mathematics, systems engineering, industrial engineering, economics, etc.

Game Theory: Third East Asia International Conference, EAGT 2019, Fuzhou, China, March 7–9, 2019, Revised Selected Papers (Communications in Computer and Information Science #1082)

by Deng-Feng Li

This book constitutes extended, revised and selected papers from the Third East Asia Game Theory International Conference, EAGT 2019, held in Fuzhou, China, in March 2019. The 10 full papers presented in this volume were carefully reviewed and selected from a total of 146 submissions. The papers in the volume are focused on non-cooperative and cooperative games and cover such subjects or disciplines as game theory, operations research, mathematics, decision science, management science, economics, experiment economics, system engineering, psychology and control theory.

Models and Methods for Interval-Valued Cooperative Games in Economic Management

by Deng-Feng Li

This book proposes several commonly used interval-valuedsolution concepts of interval-valued cooperative games with transferable utility. It thoroughly investigates these solutions,thereby establishing the properties, models, methods, and applications. Thefirst chapter proposes the interval-valued least square solutions and quadraticprogramming models, methods, and properties. Next, the satisfactory-degree-basednon-linear programming models for computing interval-valued cores andcorresponding bisection algorithm are explained. Finally, the book explores severalsimplification methods of interval-valued solutions: the interval-valued equal division and equalsurplus division values; the interval-valued Shapley, egalitarian Shapley, and discountedShapley values; the interval-valued solidarity and generalized solidarity values;and the interval-valued Banzhaf value. This book is designed for individuals fromdifferent fields and disciplines, such as decision science, game theory, managementscience, operations research, fuzzy sets or fuzzy mathematics, appliedmathematics, industrial engineering, finance, applied economics, expert system,and social economy as well as artificial intelligence. Moreover, it is suitablefor teachers, postgraduates, and researchers from different disciplines:decision analysis, management, operations research, fuzzy mathematics, fuzzysystem analysis, applied mathematics, systems engineering, project management,supply chain management, industrial engineering, applied economics, and hydrologyand water resources.

Spatial Data Mining

by Deren Li Shuliang Wang Deyi Li

#65533; This book is an updated version of awell-received book previously published in Chinese by Science Press of China(the first edition in 2006 and the second in 2013). It offers a systematic andpractical overview of spatial data mining, which combines computer science andgeo-spatial information science, allowing each field to profit from theknowledge and techniques of the other. To address the spatiotemporalspecialties of spatial data, the authors introduce the key concepts andalgorithms of the data field, cloud model, mining view, and Deren Li methods. The data field method captures the interactions between spatial objects bydiffusing the data contribution from a universe of samples to a universe ofpopulation, thereby bridging the gap between the data model and the recognitionmodel. The cloud model is a qualitative method that utilizes quantitativenumerical characters to bridge the gap between pure data and linguisticconcepts. The mining view method discriminates the different requirements byusing scale, hierarchy, and granularity in order to uncover the anisotropy ofspatial data mining. The Deren Li method performs data preprocessing to prepareit for further knowledge discovery by selecting a weight for iteration in orderto clean the observed spatial data as much as possible. In addition to theessential algorithms and techniques, the book provides application examples ofspatial data mining in geographic information science and remote sensing. Thepractical projects include spatiotemporal video data mining for protectingpublic security, serial image mining on nighttime lights for assessing theseverity of the Syrian Crisis, and the applications in the government project'the Belt and Road Initiatives'.

Artificial Intelligence with Uncertainty

by Deyi Li Yi Du

This book develops a framework that shows how uncertainty in Artificial Intelligence (AI) expands and generalizes traditional AI. It explores the uncertainties of knowledge and intelligence. The authors focus on the importance of natural language – the carrier of knowledge and intelligence, and introduce efficient physical methods for data mining amd control. In this new edition, we have more in-depth description of the models and methods, of which the mathematical properties are proved strictly which make these theories and methods more complete. The authors also highlight their latest research results.

Recommender Systems: Frontiers and Practices

by Dongsheng Li Jianxun Lian Le Zhang Kan Ren Tun Lu Tao Wu Xing Xie

This book starts from the classic recommendation algorithms, introduces readers to the basic principles and main concepts of the traditional algorithms, and analyzes their advantages and limitations. Then, it addresses the fundamentals of deep learning, focusing on the deep-learning-based technology used, and analyzes problems arising in the theory and practice of recommender systems, helping readers gain a deeper understanding of the cutting-edge technology used in these systems. Lastly, it shares practical experience with Microsoft 's open source project Microsoft Recommenders. Readers can learn the design principles of recommendation algorithms using the source code provided in this book, allowing them to quickly build accurate and efficient recommender systems from scratch.

Frontiers in Cyber Security: First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings (Communications in Computer and Information Science #879)

by Fagen Li Tsuyoshi Takagi Chunxiang Xu Xiaosong Zhang

This book constitutes the proceedings of the First International Conference on Frontiers in Cyber Security, held in Chengdu, China, in November 2018. The 18 full papers along with the3 short papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections, namely: symmetric key cryptography, public key cryptography, post-quantum cryptography, cloud security and data deduplication, access control, attack and behavior detection, system and network security, security design.

Refine Search

Showing 27,601 through 27,625 of 53,677 results