Browse Results

Showing 33,551 through 33,575 of 61,865 results

The 3rd International Workshop on Intelligent Data Analysis and Management

by Lorna Uden I-Hsien Ting Hsin-Chang Yang Leon S.L. Wang Tzung-Pei Hong

These papers on Intelligent Data Analysis and Management (IDAM) examine issues related to the research and applications of Artificial Intelligence techniques in data analysis and management across a variety of disciplines. The papers derive from the 2013 IDAM conference in Kaohsiung ,Taiwan. It is an interdisciplinary research field involving academic researchers in information technologies, computer science, public policy, bioinformatics, medical informatics, and social and behavior studies, etc. The techniques studied include (but are not limited to): data visualization, data pre-processing, data engineering, database mining techniques, tools and applications, evolutionary algorithms, machine learning, neural nets, fuzzy logic, statistical pattern recognition, knowledge filtering, and post-processing, etc.

The 8th International Conference on Knowledge Management in Organizations: Social and Big Data Computing for Knowledge Management

by Lorna Uden I-Hsien Ting Hsin-Chang Yang Leon S.L. Wang Juan Manuel Corchado Rodríguez

The proceedings from the eighth KMO conference represent the findings of this international meeting which brought together researchers and developers from industry and the academic world to report on the latest scientific and technical advances on knowledge management in organizations. This conference provided an international forum for authors to present and discuss research focused on the role of knowledge management for innovative services in industries, to shed light on recent advances in social and big data computing for KM as well as to identify future directions for researching the role of knowledge management in service innovation and how cloud computing can be used to address many of the issues currently facing KM in academia and industrial sectors.

Practical Front-End Testing: Strategies and Best Practices for Developers

by Hsin-Hao Tang

In the fast-paced and ever-evolving field of front-end development, one of the biggest challenges is maintaining high-quality code while producing work rapidly. This is why testing has become crucial. Deciding on the right testing approach and how to write and execute tests is a key issue every developer must consider. Code without tests is difficult to guarantee in terms of quality, and the solution lies in developing a solid testing strategy. This book provides practical guidance in front-end testing that will help you master a variety of techniques and understand how to apply them in real-world applications. This book dives deep into the types and implementation of front-end testing to teach you best practices for building flexible, maintainable test code. By guiding you through various strategies, the book will help you produce test code efficiently. Its pragmatic approach promises to be useful if you encounter challenges when writing tests and are searching for solutions. The book provides detailed explanations supported by visuals and code examples, helping you learn, practice, and apply various front-end tests. It presents clear principles and approaches to guide you in evaluating testing strategies and costs, so you can make the best choices. Additionally, the book contains thorough explanations of various challenges through easy-to-understand examples, enabling you to tackle testing obstacles with ease. It begins with the fundamentals of testing, discussing basics like types of tests and naming conventions. The subsequent chapters cover how to write and use unit testing, integration testing, end-to-end testing, and visual testing. Additionally, the book includes a chapter on how to perform these tests. The final chapters focus on frequently asked questions about front-end testing, serving as a quick reference for developers. The book concludes with material on how to use AI in testing to boost productivity. You Will Learn: How to write and employ a wide variety of tests, including unit testing, integration testing, end-to-end testing, and visual testing Effectively using AI tools to generate test code and enhance productivity Make informed decisions in testing, based on both cost and effectiveness Who Is This Book For: Front-end developers, full-stack developers, software testers, and QA automation developers.

Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems #30)

by Hsinchun Chen

The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups, including web sites, forums, chat rooms, blogs, social networking sites, videos, virtual world, etc. We have developed various multilingual data mining, text mining, and web mining techniques to perform link analysis, content analysis, web metrics (technical sophistication) analysis, sentiment analysis, authorship analysis, and video analysis in our research. The approaches and methods developed in this project contribute to advancing the field of Intelligence and Security Informatics (ISI). Such advances will help related stakeholders to perform terrorism research and facilitate international security and peace. This monograph aims to provide an overview of the Dark Web landscape, suggest a systematic, computational approach to understanding the problems, and illustrate with selected techniques, methods, and case studies developed by the University of Arizona AI Lab Dark Web team members. This work aims to provide an interdisciplinary and understandable monograph about Dark Web research along three dimensions: methodological issues in Dark Web research; database and computational techniques to support information collection and data mining; and legal, social, privacy, and data confidentiality challenges and approaches. It will bring useful knowledge to scientists, security professionals, counterterrorism experts, and policy makers. The monograph can also serve as a reference material or textbook in graduate level courses related to information security, information policy, information assurance, information systems, terrorism, and public policy.

Sports Data Mining

by Hsinchun Chen Osama K. Solieman Robert P. Schumaker

Data mining is the process of extracting hidden patterns from data, and it's commonly used in business, bioinformatics, counter-terrorism, and, increasingly, in professional sports. First popularized in Michael Lewis' best-selling Moneyball: The Art of Winning An Unfair Game, it is has become an intrinsic part of all professional sports the world over, from baseball to cricket to soccer. While an industry has developed based on statistical analysis services for any given sport, or even for betting behavior analysis on these sports, no research-level book has considered the subject in any detail until now. Sports Data Mining brings together in one place the state of the art as it concerns an international array of sports: baseball, football, basketball, soccer, greyhound racing are all covered, and the authors (including Hsinchun Chen, one of the most esteemed and well-known experts in data mining in the world) present the latest research, developments, software available, and applications for each sport. They even examine the hidden patterns in gaming and wagering, along with the most common systems for wager analysis.

Advances in Networked-Based Information Systems: The 24th International Conference on Network-Based Information Systems (NBiS-2021) (Lecture Notes in Networks and Systems #313)

by Leonard Barolli Tomoya Enokido Hsing-Chung Chen

This book provides the latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and their applications. The networks and information systems of today are evolving rapidly. There are new trends and applications in information networking such as wireless sensor networks, ad hoc networks, peer-to-peer systems, vehicular networks, opportunistic networks, grid and cloud computing, pervasive and ubiquitous computing, multimedia systems, security, multi-agent systems, high-speed networks, and web-based systems. These kinds of networks need to manage the increasing number of users, provide support for different services, guarantee the QoS, and optimize the network resources. For these networks, there are many research issues and challenges that should be considered and find solutions.

Innovative Mobile and Internet Services in Ubiquitous Computing: Proceedings Of The 15th International Conference On Innovative Mobile And Internet Services In Ubiquitous Computing (imis-2021) (Lecture Notes In Networks And Systems Ser. #279)

by Leonard Barolli Hsing-Chung Chen Kangbin Yim

This book includes proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), which took place in Asan, Korea, on July 1-3, 2021. With the proliferation of wireless technologies and electronic devices, there is a fast-growing interest in Ubiquitous and Pervasive Computing (UPC). The UPC enables to create a human-oriented computing environment where computer chips are embedded in everyday objects and interact with physical world. Through UPC, people can get online even while moving around, thus, having almost permanent access to their preferred services. With a great potential to revolutionize our lives, UPC also poses new research challenges. The aim of the book is to provide the latest research findings, methods, development techniques, challenges, and solutions from both theoretical and practical perspectives related to UPC with an emphasis on innovative, mobile, and Internet services.

Mobile Internet Security: First International Symposium, Mobisec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers (Communications in Computer and Information Science #797)

by Ilsun You Vishal Sharma Igor Kotenko Hsing-Chung Chen

This book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2017, held in Jeju Island, Republic of Korea, in October 2017. <P><P>The 13 revised full papers along with a short paper presented were carefully reviewed and selected from 44 submissions. They are closely related to various theories and practical applications in mobility management to highlight the state-of-the-art research.

WALCOM: 18th International Conference and Workshops on Algorithms and Computation, WALCOM 2024, Kanazawa, Japan, March 18–20, 2024, Proceedings (Lecture Notes in Computer Science #14549)

by Hsu-Chun Yen Ryuhei Uehara Katsuhisa Yamanaka

This book constitutes the refereed proceedings of the 18th International Conference and Workshops on Algorithms and Computation, WALCOM 2024, held in Kanazawa, Japan, during March 18–20, 2024. The 28 full papers presented in this book, together with two extended abstracts of invited talks, were carefully reviewed and selected from 80 submissions. They cover diverse areas of algorithms and computation, that is, approximation algorithms, algorithmic graph theory and combinatorics, combinatorial algorithms, combinatorial optimization, computational biology, combinatorial reconfiguration, computational complexity, computational geometry, discrete geometry, data structures, experimental algorithm methodologies, graph algorithms, graph drawing, parallel and distributed algorithms, parameterized algorithms, parameterized complexity, network optimization, online algorithms, randomized algorithms, and string algorithms.

WALCOM: Algorithms and Computation

by Sheung-Hung Poon Md. Saidur Rahman Hsu-Chun Yen

This book constitutes the proceedings of the 11th International Workshop on Algorithms and Computation, WALCOM 2017, held in Hsinchu, Taiwan, in March 2017. The 35 full papers presented together with three invited talks were carefully reviewed and selected from 83 submissions. The papers are organized in topical sections on invited talks; computational geometry; combinatorial optimization; graph drawing; graph algorithms; space-efficient algorithms; computational complexity; approximation algorithms.

Handbook of Operations Analytics Using Data Envelopment Analysis

by Joe Zhu Shiuh-Nan Hwang Hsuan-Shih Lee

This handbook focuses on Data Envelopment Analysis (DEA) applications in operations analytics which are fundamental tools and techniques for improving operation functions and attaining long-term competitiveness. In fact, the handbook demonstrates that DEA can be viewed as Data Envelopment Analytics. Chapters include a review of cross-efficiency evaluation; a case study on measuring the environmental performance of OECS countries; how to select a set of performance metrics in DEA with an application to American banks; a relational network model to take the operations of individual periods into account in measuring efficiencies; how the efficient frontier methods DEA and stochastic frontier analysis (SFA) can be used synergistically; and how to integrate DEA and multidimensional scaling. In other chapters, authors construct a dynamic three-stage network DEA model; a bootstrapping based methodology to evaluate returns to scale and convexity assumptions in DEA; hybridizing DEA and cooperative games; using DEA to represent the production technology and directional distance functions to measure band performance; an input-specific Luenberger energy and environmental productivity indicator; and the issue of reference set by differentiating between the uniquely found reference set and the unary and maximal types of the reference set. Finally, additional chapters evaluate and compare the technological advancement observed in different hybrid electric vehicles (HEV) market segments over the past 15 years; radial measurement of efficiency for the production process possessing multi-components under different production technologies; issues around the use of accounting information in DEA; how to use DEA environmental assessment to establish corporate sustainability; a summary of research efforts on DEA environmental assessment applied to energy in the last 30 years; and an overview of DEA and how it can be utilized alone and with other techniques to investigate corporate environmental sustainability questions.

Web and Internet Economics: 17th International Conference, WINE 2021, Potsdam, Germany, December 14–17, 2021, Proceedings (Lecture Notes in Computer Science #13112)

by Michal Feldman Hu Fu Inbal Talgam-Cohen

This book constitutes the refereed proceedings of the 17th International Conference on Web and Internet Economics, WINE 2021, which was held online during December 14-17, 2021. The conference was originally planned to take place in Potsdam, Germany, but changed to a virtual event due to the COVID-19 pandemic. The 41 full papers presented in this volume were carefully reviewed and selected from 146 submissions. They were organized in topical sections as follows: mechanism design and pricing; matching, markets and equilibria; learning, fairness, privacy and behavioral models; social choice and cryptocurrencies.

Dynamics in Chinese Digital Commons: Law, Technology, and Governance

by Hu Ling

The book provides an up-to-date, comprehensive, and critical explanation of digital commons in China.It aims to reshape the theoretical discussion of digital commons, stressing the significance of digital mode of production and power division structure between government and digital platforms—both characters shed light on how China has developed its digital economy and maintained a relatively innovative cyberspace during the past 20 years. This book could serve as a foundational analysis for future studies on China’s Internet.The book will appeal to scholars, entrepreneurs, and policymakers interested in digital commons, governance of cyberspace, and China's political economy.

Fractional Processes and Fractional-Order Signal Processing

by Hu Sheng Yangquan Chen Tianshuang Qiu

Fractional processes are widely found in science, technology and engineering systems. In Fractional Processes and Fractional-order Signal Processing, some complex random signals, characterized by the presence of a heavy-tailed distribution or non-negligible dependence between distant observations (local and long memory), are introduced and examined from the 'fractional' perspective using simulation, fractional-order modeling and filtering and realization of fractional-order systems. These fractional-order signal processing (FOSP) techniques are based on fractional calculus, the fractional Fourier transform and fractional lower-order moments. Fractional Processes and Fractional-order Signal Processing: presents fractional processes of fixed, variable and distributed order studied as the output of fractional-order differential systems; introduces FOSP techniques and the fractional signals and fractional systems point of view; details real-world-application examples of FOSP techniques to demonstrate their utility; and provides important background material on Mittag-Leffler functions, the use of numerical inverse Laplace transform algorithms and supporting MATLAB® codes together with a helpful survey of relevant webpages. Readers will be able to use the techniques presented to re-examine their signals and signal-processing methods. This text offers an extended toolbox for complex signals from diverse fields in science and engineering. It will give academic researchers and practitioners a novel insight into the complex random signals characterized by fractional properties, and some powerful tools to analyze those signals.

Fuzzy Petri Nets for Knowledge Representation, Acquisition and Reasoning

by Hu-Chen Liu Hua Shi

This book provides valuable knowledge, useful fuzzy Petri nets (FPN) models, and practical examples that can be considered by mangers in supporting knowledge management of organizations to increase and sustain their competitive advantages. In this book, the authors proposed various improved FPN models to enhance the modeling power and applicability of FPNs in knowledge representation and reasoning. This book is useful for practitioners and researchers working in the fields of knowledge management, operation management, information science, industrial engineering, and management science. It can also be used as a textbook for postgraduate and senior undergraduate students.

Image and Graphics Technologies and Applications: 19th Chinese Conference, IGTA 2024, Beijing, China, August 16–18, 2024, Revised Selected Papers (Communications in Computer and Information Science #2302)

by Hua Huang Yongtian Wang

This book constitutes the refereed proceedings of the 19th Chinese Conference on Image and Graphics Technologies and Applications, IGTA 2024, held in Beijing, China, during August 16–18, 2024. The 36 full papers included in this book were carefully reviewed and selected from 91 submissions. The papers focus on image processing, computer graphics, and related topics, including but not limited to image analysis and understanding, computer vision and pattern recognition, data mining, virtual reality and augmented reality, and image technology applications.

Access Control Management in Cloud Environments

by Yanchun Zhang Hua Wang Jinli Cao

This textbook introduces new business concepts on cloud environments such as secure, scalable anonymity and practical payment protocols for the Internet of things and Blockchain technology. The protocol uses electronic cash for payment transactions. In this new protocol, from the viewpoint of banks, consumers can improve anonymity if they are worried about disclosure of their identities in the cloud. Currently, there is not a book available that has reported the techniques covering the protocols with anonymizations and Blockchain technology. Thus this will be a useful book for universities to purchase. This textbook provides new direction for access control management and online business, with new challenges within Blockchain technology that may arise in cloud environments. One is related to the authorization granting process. For example, when a role is granted to a user, this role may conflict with other roles of the user or together with this role; the user may have or derive a high level of authority. Another is related to authorization revocation. For instance, when a role is revoked from a user, the user may still have the role. Experts will get benefits from these challenges through the developed methodology for authorization granting algorithm, and weak revocation and strong revocation algorithms.

Databases Theory and Applications: 33rd Australasian Database Conference, ADC 2022, Sydney, NSW, Australia, September 2–4, 2022, Proceedings (Lecture Notes in Computer Science #13459)

by Wen Hua Hua Wang Lei Li

This book constitutes the refereed proceedings of the 33rd International Conference on Databases Theory and Applications, ADC 2022, held in Sydney, Australia, in September 2022. The conference is co-located with the 48th International Conference on Very Large Data Bases, VLDB 2022. The 9 full papers presented together with 8 short papers were carefully reviewed and selected from 36 submissions. ADC focuses on database systems, data-driven applications, and data analytics.

Health Information Science: 9th International Conference, HIS 2020, Amsterdam, The Netherlands, October 20–23, 2020, Proceedings (Lecture Notes in Computer Science #12435)

by Yanchun Zhang Hua Wang Siuly Siuly Rui Zhou Zhisheng Huang

This book constitutes the proceedings of the 9th International Conference on Health Information Science, HIS 2020, which took place in Amsterdam, The Netherlands, during October 20-23, 2020. The 11 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 62 submissions. They were organized in topical sections named: mental health; medical record processing; medical information systems; medical diagnosis with machine learning; and health behavior and medication.

Web Information Systems Engineering – WISE 2016

by Wojciech Cellary Yanchun Zhang Hua Wang Rui Zhou Mohamed F. Mokbel Jianmin Wang

This two volume set LNCS 10041 and LNCS 10042 constitutes the proceedings of the 17th International Conference on Web Information Systems Engineering, WISE 2016, held in Shanghai, China, in November 2016. The 39 full papers and 31 short papers presented in these proceedings were carefully reviewed and selected from 233 submissions. The papers cover a wide range of topics such as Social Network Data Analysis; Recommender Systems; Topic Modeling; Data Diversity; Data Similarity; Context-Aware Recommendation; Prediction; Big Data Processing; Cloud Computing; Event Detection; Data Mining; Sentiment Analysis; Ranking in Social Networks; Microblog Data Analysis; Query Processing; Spatial and Temporal Data; Graph Theory; Non-Traditional Environments; and Special Session on Data Quality and Trust in Big Data.

Web Information Systems Engineering – WISE 2016

by Wojciech Cellary Yanchun Zhang Hua Wang Rui Zhou Mohamed F. Mokbel Jianmin Wang

This two volume set LNCS 10041 and LNCS 10042 constitutes the proceedings of the 17th International Conference on Web Information Systems Engineering, WISE 2016, held in Shanghai, China, in November 2016. The 39 full papers and 31 short papers presented in these proceedings were carefully reviewed and selected from 233 submissions. The papers cover a wide range of topics such as Social Network Data Analysis; Recommender Systems; Topic Modeling; Data Diversity; Data Similarity; Context-Aware Recommendation; Prediction; Big Data Processing; Cloud Computing; Event Detection; Data Mining; Sentiment Analysis; Ranking in Social Networks; Microblog Data Analysis; Query Processing; Spatial and Temporal Data; Graph Theory; Non-Traditional Environments; and Special Session on Data Quality and Trust in Big Data.

Web Information Systems Engineering – WISE 2020: 21st International Conference, Amsterdam, The Netherlands, October 20–24, 2020, Proceedings, Part I (Lecture Notes in Computer Science #12342)

by Yanchun Zhang Hua Wang Rui Zhou Zhisheng Huang Wouter Beek

This book constitutes the proceedings of the 21st International Conference on Web Information Systems Engineering, WISE 2020, held in Amsterdam, The Netherlands, in October 2020.The 81 full papers presented were carefully reviewed and selected from 190 submissions. The papers are organized in the following topical sections: Part I: network embedding; graph neural network; social network; graph query; knowledge graph and entity linkage; spatial temporal data analysis; and service computing and cloud computing Part II: information extraction; text mining; security and privacy; recommender system; database system and workflow; and data mining and applications

Web Information Systems Engineering – WISE 2020: 21st International Conference, Amsterdam, The Netherlands, October 20–24, 2020, Proceedings, Part II (Lecture Notes in Computer Science #12343)

by Yanchun Zhang Hua Wang Rui Zhou Zhisheng Huang Wouter Beek

This book constitutes the proceedings of the 21st International Conference on Web Information Systems Engineering, WISE 2020, held in Amsterdam, The Netherlands, in October 2020.The 81 full papers presented were carefully reviewed and selected from 190 submissions. The papers are organized in the following topical sections: Part I: network embedding; graph neural network; social network; graph query; knowledge graph and entity linkage; spatial temporal data analysis; and service computing and cloud computing Part II: information extraction; text mining; security and privacy; recommender system; database system and workflow; and data mining and applications

Web Information Systems Engineering – WISE 2024: 25th International Conference, Doha, Qatar, December 2–5, 2024, Proceedings, Part I (Lecture Notes in Computer Science #15436)

by Xin Wang Hua Wang Mahmoud Barhamgi

This five-volume set LNCS 15436 -15440 constitutes the proceedings of the 25th International Conference on Web Information Systems Engineering, WISE 2024, held in Doha, Qatar, in December 2024. The 110 full papers and 55 short papers were presented in these proceedings were carefully reviewed and selected from 368 submissions. The papers have been organized in the following topical sections as follows: Part I : Information Retrieval and Text Processing; Text and Sentiment Analysis; Data Analysis and Optimisation; Query Processing and Information Extraction; Knowledge and Data Management. Part II: Social Media and News Analysis; Graph Machine Learning on Web and Social; Trustworthy Machine Learning; and Graph Data Management. Part III: Recommendation Systems; Web Systems and Architectures; and Humans and Web Security. Part IV: Learning and Optimization; Large Language Models and their Applications; and AI Applications. Part V: Security, Privacy and Trust; Online Safety and Wellbeing through AI; and Web Technologies.a

Web Information Systems Engineering – WISE 2024: 25th International Conference, Doha, Qatar, December 2–5, 2024, Proceedings, Part II (Lecture Notes in Computer Science #15437)

by Xin Wang Hua Wang Mahmoud Barhamgi

This five-volume set LNCS 15436 -15440 constitutes the proceedings of the 25th International Conference on Web Information Systems Engineering, WISE 2024, held in Doha, Qatar, in December 2024. The 110 full papers and 55 short papers were presented in these proceedings were carefully reviewed and selected from 368 submissions. The papers have been organized in the following topical sections as follows: Part I : Information Retrieval and Text Processing; Text and Sentiment Analysis; Data Analysis and Optimisation; Query Processing and Information Extraction; Knowledge and Data Management. Part II: Social Media and News Analysis; Graph Machine Learning on Web and Social; Trustworthy Machine Learning; and Graph Data Management. Part III: Recommendation Systems; Web Systems and Architectures; and Humans and Web Security. Part IV: Learning and Optimization; Large Language Models and their Applications; and AI Applications. Part V: Security, Privacy and Trust; Online Safety and Wellbeing through AI; and Web Technologies.a

Refine Search

Showing 33,551 through 33,575 of 61,865 results