This book features a selection of papers presented at the Second IFIP WG 12.6 International Workshop on Artificial Intelligence for Knowledge Management, AI4KM 2014, held in Wroclaw, Poland, in September 2014, in the framework of the Federated Conferences on Computer Science and Information Systems, FedCSIS 2014. The 9 revised and extended papers and one invited paper were carefully reviewed an…
The two-volume set LNAI 9119 and LNAI 9120 constitutes the refereed proceedings of the 14th International Conference on Artificial Intelligence and Soft Computing, ICAISC 2015, held in Zakopane, Poland in June 2015. The 142 revised full papers presented in the volumes, were carefully reviewed and selected from 322 submissions. These proceedings present both traditional artificial intelligence m…
This book constitutes the refereed proceedings of the 11th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2015, held in Bayonne, France, in September 2015. The 35 revised full papers presented were carefully reviewed and selected from 81 submissions. The papers feature highly novel research describing innovative algorithms, systems, tools and…
This unique text/reference describes an exciting and novel approach to supercomputing in the DataFlow paradigm. The major advantages and applications of this approach are clearly described, and a detailed explanation of the programming model is provided using simple yet effective examples. The work is developed from a series of lecture courses taught by the authors in more than 40 universities …
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Security for Information Technology and Communications, SECITC 2015, held in Bucharest, Romania, in June 2015. The 17 revised full papers were carefully reviewed and selected from 36 submissions. In addition with 5 invited talks the papers cover topics such as Cryptographic Algori…
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop, COSADE 2015, held in Berlin, Germany, in April 2015. The 17 revised full papers presented were carefully selected from 48 submissions. the focus of this workshop was on following topics: side-channel attacks, FPGA countermeasures, timing attacks and countermeasures, fault attacks, counte…
The explosive growth in data, computational power, and social media creates new opportunities for innovating the processes and solutions of Information and communications technology (ICT) based policy-making and research. To take advantage of these developments in the digital world, new approaches, concepts, instruments and methods are needed to navigate the societal and computational complexit…
This open access book offers an innovative account of how relief organizations’ visual depiction of Syrian displacement contributes to reproduce and reinforce a securitized account of refugees. Through visual analysis, the book demonstrates how the securitization process takes place in three different ways. First of all, even if marginally, it occurs through the reproduction of mainstream med…
This brief presents a unified analytical framework for the evaluation of drive-thru Internet performance and accordingly proposes an optimal spatial access control management approach. A comprehensive overview and in-depth discussion of the research literature is included. It summarizes the main concepts and methods, and highlights future research directions. The brief also introduces a novel c…
Practical Business Analytics Using SAS: A Hands-on Guide shows SAS users and businesspeople how to analyze data effectively in real-life business scenarios. The book begins with an introduction to analytics, analytical tools, and SAS programming. The authors—both SAS, statistics, analytics, and big data experts—first show how SAS is used in business, and then how to get started programmi…