This book describes the benefits that emerge when the fields of constraint programming and concurrency meet. On the one hand, constraints can be used in concurrency theory to increase the conciseness and the expressive power of concurrent languages from a pragmatic point of view. Meer
Computational Creativity, Concept Invention, and General Intelligence in their own right all are flourishing research disciplines producing surprising and captivating results that continuously influence and change our view on where the limits of intelligent machines lie, each day pushing the boundaries a bit further. Meer
In this work we plan to revise the main techniques for enumeration algorithms and to show four examples of enumeration algorithms that can be applied to efficiently deal with some biological problems modelled by using biological networks: enumerating central and peripheral nodes of a network, enumerating stories, enumerating paths or cycles, and enumerating bubbles. Meer
This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. Meer
This book focuses on the design of secure and efficient signature and signcryption schemes for vehicular ad-hoc networks (VANETs). We use methods such as public key cryptography (PKI), identity-based cryptography (IDC), and certificateless cryptography (CLC) to design bilinear pairing and elliptic curve cryptography-based signature and signcryption schemes and prove their security in the random oracle model. Meer
This book constitutes the refereed proceedings of the 16th China Conference on Wireless Sensor Networks, CWSN 2022, which took place in Guangzhou, China, in November 2022. Meer
In this book, the authors highlight the latest research findings on the security and privacy of federated learning systems. The main attacks and counterattacks in this booming field are presented to readers in connection with inference, poisoning, generative adversarial networks, differential privacy, secure multi-party computation, homomorphic encryption, and shuffle, respectively. Meer
This book features selected papers presented at the 4th International Conference on Recent Innovations in Computing (ICRIC 2021), held on June 8–9, 2021 by Eötvös Loránd University (ELTE), Budapest, Hungary in association with many Universities; WSG Poland, Knowledge University, ERBIL. Meer
This book presents a comprehensive review of heterogeneous face analysis and synthesis, ranging from the theoretical and technical foundations to various hot and emerging applications, such as cosmetic transfer, cross-spectral hallucination and face rotation. Meer
This book gathers the proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS), held at the Military Engineering Institute, Rio de Janeiro, Brazil, from 8 to 10th May 2019. Meer
This book focuses on lattice-based cryptosystems, widely considered to be one of the most promising post-quantum cryptosystems and provides fundamental insights into how to construct provably secure cryptosystems from hard lattice problems. Meer
Focusing on the vision-based and sensor-based recognition and analysis of human activity and behavior, this book gathers extended versions of selected papers presented at the International Conference on Activity and Behavior Computing (ABC 2020), held in Kitakyushu, Japan on August 26 – 29, 2020. Meer
This book presents theoretical modeling and numerical simulations applied to drive several applications towards Industrial Revolution 4.0 (IR 4.0). The topics discussed range from theoretical parts to extensive simulations involving many efficient algorithms as well as various statistical techniques. Meer
The proceeding presents best selected papers presented at 5th International Conference on Smart Computing and Informatics (SCI 2021), held at Department of Computer Science and Engineering, Vasvi College of Engineering, Hyderabad, Telangana, India, during 17 – 18 September 2021. Meer
This beginner-oriented book will help you understand and perform anomaly detection by learning cutting-edge machine learning and deep learning techniques. Meer
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books