Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each other, thus triggering the development …
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines. The journal focuses on original high-quality research in the realm of computational science in parallel and distributed environments, enco…
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence that emerges from the collaboration and competiti…
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence that emerges from the collaboration and competiti…
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence that emerges from the collaboration and competiti…
This book deals in a basic and systematic manner with the fundamentals of random function theory and looks at some aspects related to arrival, vehicle headway and operational speed processes at the same time. The work serves as a useful practical and educational tool and aims at providing stimulus and motivation to investigate issues of such a strong applicative interest. It has a clearly discu…
This book continues the biannual series of conference proceedings, which has become a classical reference resource in traffic and granular research alike, and addresses the latest developments at the intersection of physics, engineering and computational science. These involve complex systems, in which multiple simple agents, be they vehicles or particles, give rise to surprising and fascinatin…
This book constitutes the refereed proceedings of the 7th International Workshop on Traffic Monitoring and Analysis, TMA 2015, held in Barcelona, Spain, in April 2015. The 16 full papers presented in this volume were carefully reviewed and selected from 54 submissions. The contributions are organized in topical sections on measurement tools and methods; mobile and wireless; Web; security; an…
The book discusses new algorithms capable of searching for, tracking, mapping and providing a visualization of invisible substances. It reports on the realization of a bacterium-inspired robotic controller that can be used by an agent to search for any environmental spatial function such as temperature or pollution. Using the parameters of a mathematical model, the book shows that it is possibl…
This book provides readers with a snapshot of the state-of-the art in fuzzy logic. Throughout the chapters, key theories developed in the last fifty years as well as important applications to practical problems are presented and discussed from different perspectives, as the authors hail from different disciplines and therefore use fuzzy logic for different purposes. The book aims at showing ho…