This book constitutes the thoroughly refereed proceedings of the 8th Russian Summer School on Information Retrieval, RuSSIR 2014, held in Nizhniy Novgorod, Russia, in August 2014. The volume includes 6 tutorial papers, summarizing lectures given at the event, and 8 revised papers from the school participants.The papers focus on various aspects of information retrieval.
The sixth Austrian Robotics Workshop sought to bring together researchers, professionals and practitioners working on different topics in robotics to discuss recent developments and future challenges in robotics and its applications. The 2018 edition of the workshop series was held at the University of Innsbruck in May 2018. - Der sechste Austrian Robotics Workshop versammelte Forscher, Experte…
The Bantu languages are in some sense remarkably uniform (SVO basic word order, noun classes, verbal morphology), but this extensive language family also show a wealth of morphosyntactic variation. Two core areas in which such variation is attested are subject and object agreement. The book explores the variation in Bantu subject and object marking on the basis of data from 75 Bantu languages, …
This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction mod…
This volume contains thirty-nine revised and extended research articles, written by prominent researchers participating in the World Congress on Engineering and Computer Science 2014, held in San Francisco, October 22-24 2014. Topics covered include engineering mathematics, electrical engineering, circuit design, communications systems, computer science, chemical engineering, systems engineerin…
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development …
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, enco…
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence that emerges from the collaboration and competiti…
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence that emerges from the collaboration and competiti…
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence that emerges from the collaboration and competiti…