Browse Results

Showing 20,651 through 20,675 of 54,498 results

Cryptographic Hardware and Embedded Systems – CHES 2017: 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings (Lecture Notes in Computer Science #10529)

by Naofumi Homma Wieland Fischer

This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The 33 full papers presented in this volume were carefully reviewed and selected from 130 submissions. The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations. The workshop builds a valuable bridge between the research and cryptographic engineering communities and attracts participants from industry, academia, and government organizations.

Handbuch Industrie 4.0: Band 3: Logistik (Springer Reference Technik Ser.)

by Michael Ten Hompel Thomas Bauernhansl Birgit Vogel-Heuser

Mit der Neuauflage des erfolgreichen Werkes wird die Geschichte der vierten industriellen Revolution fortgeschrieben und der Dynamik Rechnung getragen, mit der die Vision in den vergangenen zwei bis drei Jahren weiterentwickelt und verwirklicht wurde.Experten aus Wissenschaft und Technik beleuchten verschiedene Facetten der Industrie 4.0 und schaffen gleichermaßen einen Überblick über den Stand der Technik und die Vision selbst. Dies gelingt nicht zuletzt Dank einer ausgewogenen Mischung aus wissenschaftlichen Erkenntnissen, Praxisbeispielen und Übersichtsbeiträgen. Die Themen der Beiträge reichen von Basistechnologien über Integrations- und Migrationsansätze bis hin zu Geschäftsmodellen und Dienstleistungen für die Industrie 4.0. Zudem werden die Datensicherheit und auch rechtliche Aspekte mit Datenanalyse und maschinellem Lernen behandelt. In der dritten Auflage werden die Themenfelder um Künstliche Intelligenz, aktuelle Mobilfunkstandards und den daraus resultierenden Potentialen für eine zukünftige Plattformökonomie erweitert.Die dritte überarbeitete und erweiterte Auflage erscheint wiederum in 3 Bänden. Der vorliegende dritte Band umfasst neue und bearbeitete Beiträge zur Logistik. Online ist dieses Nachschlagewerk auch über Springer Reference verfügbar.

Universos paralelos

by Ricardo Homs

La tecnología informática le han dado a los medios masivos de la comunicación una gran capacidad de convocatoria para unir los consensos de sectores sociales y políticos y, de esta manera, incidir enormemente en la opinión pública. Con esto, sin que estemos conscientes, nos han impuesto los temas que ahora son prioritarios para la sociedad. Universos paralelos nos ofrece una versión de cómo se han conformado, a partir de la tecnología virtual y la globalización, fuerzas ocultas que quieren controlar nuestro estilo de la vida y nuestra mente, y muestra también cómo se han constituido poderes fácticos que deciden en qué clase de mundo debemos vivir. En los últimos años, sin darnos cuenta, hemos vivido en dos mundos: el de nuestra vida cotidiana, y en uno paralelo que no tiene control, que es invisible, pero determinante.

You've Been Played: How Corporations, Governments, and Schools Use Games to Control Us All

by Adrian Hon

How games are being harnessed as instruments of exploitation—and what we can do about it Warehouse workers pack boxes while a virtual dragon races across their screen. If they beat their colleagues, they get an award. If not, they can be fired. Uber presents exhausted drivers with challenges to keep them driving. China scores its citizens so they behave well, and games with in-app purchases use achievements to empty your wallet.Points, badges, and leaderboards are creeping into every aspect of modern life. In You&’ve Been Played, game designer Adrian Hon delivers a blistering takedown of how corporations, schools, and governments use games and gamification as tools for profit and coercion. These are games that we often have no choice but to play, where losing has heavy penalties. You&’ve Been Played is a scathing indictment of a tech-driven world that wants to convince us that misery is fun, and a call to arms for anyone who hopes to preserve their dignity and autonomy.

ISO27001 in a Windows® Environment

by Brian Honan

A fundamental title that should be part of every information security practitioner''s technical library!The vast majority of ISO27001 implementations will, to one extent or another, take place in a Windows environment. ISO27001 project managers are not always Microsoft technical experts, but a large number of the ISO27001 controls require a technical implementation. Bridging the gap between non-technical ISO27001 project managers and IT specialists, this book explains what the controls are, and describes how to implement them in a Windows environment, equipping the ISO27001 project manager to succeed with the implementation. MCSEs who have security training (MCSE Security), but who may not understand the ISO27001 approach to selecting and implementing controls, will also benefit from this book. It provides them with the necessary rationale and links their technical understanding of Microsoft information security controls into the international best practice framework for information security. This book should be a core part of the technical library of every MCSE and information security practitioner. If you have a CISSP, CISM, GIAC, or another professional certification, you should read this book. Covering best practice implementation over a wide range of Windows® environments, this second edition is completely up to date for Windows® 7 and Server® 2008. Benefits to business include: * Enable successful implementation Although ISO27001 project managers are seldom Microsoft technical experts, a large number of the ISO27001 Annexe A controls demand a technical implementation. Now, thanks to this book, project managers can finally give a clear explanation to their technical people of what is required under ISO27001. Armed with this guide, a project manager will find it much easier to succeed with implementation of ISO27001 * Help security engineers to understand ISO27001 ISO27001 is the international best practice framework for information security. However, because ISO27001 takes a business risk approach, it is unfamiliar territory to many Microsoft Certified Systems Engineers (MCSEs), even if they already have security training (MCSE Security). With this book, MSCEs can fill a gap in their knowledge and thereby harness their technical understanding of the Microsoft information security controls to drive through implementation of ISO27001 * Improve security and reliability. The purpose of ISO27001 is to ensure the confidentiality, integrity and availability of your business information. By putting suitable controls in place you can achieve these "CIA" goals. In this way you will also make your storage and handling of data more reliable * Take advantage of the tools you already have to hand. Since Microsoft products are so widely used, the technical details in this book are based on the Microsoft Windows® platform. This book shows IT managers how to make effective use of the Microsoft technologies at their disposal to support implementation of ISO27001. As a result, your organisation should be able to achieve certification without having to buy additional third-party software. Security improvements from MicrosoftMicrosoft''s latest desktop operating system, Windows® 7, comes with many security improvements. You can use these to help you to develop an ISMS that complies with ISO27001. One of these features is BitLocker, an encrypting system that allows you to encrypt individual files and folders. You can also encrypt the entire contents of a computer''s hard disk to make the data stored on it unavailable to unauthorised personnel. BitLocker To Go enables you to transport information securely from one system to another using portable devices such as a USB. Another feature of Windows 7, AppLocker, will allow your organisation to restrict the applications available to a user on a desktop. By preventing improper use of key applications by your staff, AppLocker can help your organisation to reduce security risks. This guide provides the IT manager with a detailed breakdown of the various controls requir...

Integrated Uncertainty in Knowledge Modelling and Decision Making: 9th International Symposium, IUKM 2022, Ishikawa, Japan, March 18–19, 2022, Proceedings (Lecture Notes in Computer Science #13199)

by Katsuhiro Honda Tomoe Entani Seiki Ubukata Van-Nam Huynh Masahiro Inuiguchi

This book constitutes the refereed proceedings of the 98th International Symposium on Integrated Uncertainty in Knowledge Modelling and Decision Making, IUKM 2021, held in Ishikawa, Japan, in March 2022. The 30 full papers presented were carefully reviewed and selected from 46 submissions. The papers deal with all aspects of uncertainty modelling and management and are organized in topical sections on uncertainty management and decision making, optimization and statistical methods, pattern classification and data analysis, machine learning, and economic applications.

Integrated Uncertainty in Knowledge Modelling and Decision Making: 10th International Symposium, IUKM 2023, Kanazawa, Japan, November 2–4, 2023, Proceedings, Part II (Lecture Notes in Computer Science #14376)

by Katsuhiro Honda Bac Le Van-Nam Huynh Masahiro Inuiguchi Youji Kohda

These two volumes constitute the proceedings of the 10th International Symposium on Integrated Uncertainty in Knowledge Modelling and Decision Making, IUKM 2023, held in Kanazawa, Japan, during November 2-4, 2023.The 58 full papers presented were carefully reviewed and selected from 107 submissions. The papers deal with all aspects of research results, ideas, and experiences of application among researchers and practitioners involved with all aspects of uncertainty modelling and management.

Ecologies of Internet Video: Beyond YouTube (Routledge Research in Cultural and Media Studies)

by John Hondros

This book explores the complex, dynamic, and contested webs of relationships in which three different groups of video makers found themselves when distributing their work on the Internet. It draws upon both the Deleuzian notion of "assemblage" and Actor-Network Theory, which together provide a rich conceptual framework for characterizing and analysing these webs. The groups examined are a UK video activist project, a community of film and television fans originating in the US, and an association of US community television producers. Rather than taking YouTube as its point of departure, this book centres on the groups themselves, contextualizing their contemporary distribution practices within their pre-Internet histories. It then follows the groups as they drew upon various Internet technologies beyond YouTube to create their often-complex video distribution assemblages, a process that entangled them in these webs of relationships. Through the analysis of detailed ethnographic fieldwork conducted across a period of several years, this book demonstrates that while the groups found some success in achieving their various goals as video makers, their situations were often problematic and their agency limited, with their practices contested by both human and technological actors within their distribution assemblages.

Microsoft® Windows® Desktop Deployment Resource Kit

by Jerry Honeycutt

Deploy and manage Microsoft Windows XP and Microsoft Office 2003 Editions with expertise from well-known Windows authority Jerry Honeycutt. This official RESOURCE KIT packs the in-depth information you need to determine the best deployment path for your organization; prepare and test for deployment; automate, customize, and distribute installations; and manage and support your deployment. You also get timesaving scripts, worksheets, and a searchable eBook on CD--everything you need to help maximize the performance and reliability of your business desktops and help reduce ownership and support costs. Get in-depth guidance on how to: Apply best practices for deployment planning Identify and resolve migration and application compatibility issues Configure user settings, build distribution points, and "chain" installations Plan for and migrate users' existing data and settings Create disk images and deploy them using third-party tools Use Remote Installation Services (RIS) to support clean installations Help automate deployment with Systems Management Server (SMS) Deploy critical security and feature updates with Microsoft Software Update Services (SUS) Provide multilingual compatibility and enable support for mobile users Automate desktop deployment and management tasks with batch scripts CD includes: Scripts, worksheets, white papers, and an eBook. Get scripts to: Configure data Copy device drivers Join domains List applications Run installations Migrate users and more Plus worksheets for: Application compatibility and testing Disk imaging Distribution methods and shares Dynamic updates Master configuration RIS planning, deployment, testing Windows XP Group Policy and more A Note Regarding the CD or DVD The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Microsoft® Windows® Registry Guide

by Jerry Honeycutt

Get the in-depth information you need to modify--and seamlessly manage--the Windows registry. Written for IT professionals and power users, this vital resource reveals little-known registry techniques, tricks, tips, and secrets to make your job easier. Understand the inner workings of the Windows operating system--and use the registry to get Windows Server 2003 and Windows XP to run the way you want, on a single desktop or across the network. You'll learn how to pinpoint registry settings and script registry changes, deal with registry permissions, use Windows Installer, and map Tweak UI settings. Also, find best practices for how to back up, restore, and maintain registry settings with confidence. The CD includes 100+ registry files for customizing operating system appearance and behavior, and the complete eBook. You'll learn how to: Apply best practices to back up, restore, manage, and modify the registry Customize group and system policies to manage multiple PCs and users remotely Track down registry settings and script changes Optimize server services, including network connections and authentication Deploy user profiles and Microsoft Office program settings Configure security services, including Windows Firewall, templates, and service pack features Troubleshoot the registry--resolving common problems and corruption issues A Note Regarding the CD or DVD The print version of this book ships with a CD or DVD. For those customers purchasing one of the digital formats in which this book is available, we are pleased to offer the CD/DVD content as a free download via O'Reilly Media's Digital Distribution services. To download this content, please visit O'Reilly's web site, search for the title of this book to find its catalog page, and click on the link below the cover image (Examples, Companion Content, or Practice Files). Note that while we provide as much of the media content as we are able via free download, we are sometimes limited by licensing restrictions. Please direct any questions or concerns to booktech@oreilly.com.

Federated Learning for Wireless Networks (Wireless Networks)

by Choong Seon Hong Latif U. Khan Mingzhe Chen Dawei Chen Walid Saad Zhu Han

Recently machine learning schemes have attained significant attention as key enablers for next-generation wireless systems. Currently, wireless systems are mostly using machine learning schemes that are based on centralizing the training and inference processes by migrating the end-devices data to a third party centralized location. However, these schemes lead to end-devices privacy leakage. To address these issues, one can use a distributed machine learning at network edge. In this context, federated learning (FL) is one of most important distributed learning algorithm, allowing devices to train a shared machine learning model while keeping data locally. However, applying FL in wireless networks and optimizing the performance involves a range of research topics. For example, in FL, training machine learning models require communication between wireless devices and edge servers via wireless links. Therefore, wireless impairments such as uncertainties among wireless channel states, interference, and noise significantly affect the performance of FL. On the other hand, federated-reinforcement learning leverages distributed computation power and data to solve complex optimization problems that arise in various use cases, such as interference alignment, resource management, clustering, and network control. Traditionally, FL makes the assumption that edge devices will unconditionally participate in the tasks when invited, which is not practical in reality due to the cost of model training. As such, building incentive mechanisms is indispensable for FL networks. This book provides a comprehensive overview of FL for wireless networks. It is divided into three main parts: The first part briefly discusses the fundamentals of FL for wireless networks, while the second part comprehensively examines the design and analysis of wireless FL, covering resource optimization, incentive mechanism, security and privacy. It also presents several solutions based on optimization theory, graph theory, and game theory to optimize the performance of federated learning in wireless networks. Lastly, the third part describes several applications of FL in wireless networks.

Applied Degree Education and the Future of Learning (Lecture Notes in Educational Technology)

by Christina Hong Will W. K. Ma

This book draws on the responses to learning and teaching and applied education futures thinking, that provide insights into the future of learning. It brings together more than 30 novel and important applied research and scholarly contributions from around the world, including Australia, Canada, Finland, Germany, Hong Kong, Japan, Macau, Mainland China, Malaysia, Morocco, Pakistan, and the UK. The chapters, including reflective essays and practice-based case examples, are divided into five major themes:• Future ready values and competencies for the future of work• Innovative pedagogies in applied degree learning and training• Driving student access, engagement, and success through digital technologies• Intelligent technologies: Embedding the new world of work into applied degrees• Lifelong learning, partnering, and the future of workThis book is important for readers interested in international perspectives on the future of work and professional education.

Applied Degree Education and the Future of Work: Education 4.0 (Lecture Notes in Educational Technology)

by Christina Hong Will W. K. Ma

This edited volume sets the stage for discussion on Education 4.0, with a focus on applied degree education and the future of work. Education 4.0 refers to the shifts in the education sector in response to Industry 4.0 where digital transformation is impacting the ways in which the world of work and our everyday lives are becoming increasingly automated. In the applied degree sector, significant change and transformation is occurring as leaders, educators and partners evolve smart campus environments to include blended learning, artificial intelligence, data analytics, BYOD devices, process automation and engage in curriculum renewal for and with industries and professions. This volume aims to profile and enhance the contribution of applied educational practice and research particularly in the applied degree sector and includes contributions that show case real world outcomes with students and industry as partners. This edited volume includes a wide range of topics, such as rethinking the role of education and educators; curriculum and the future of work; industrial partnership, collaboration and work integrated learning; vocational and professional practices; students, industry and professions as partners; employability skills and qualities for the 21st century world of work; innovative pedagogy and instructional design; adaptive learning technologies; and data analytics, assessment and feedback. The contributors come from different parts of the world in higher education, including, Canada, China, Finland, Germany, Hong Kong, Italy, Macau, Singapore and the United Kingdom.

Applied Degree Education and the Shape of Things to Come (Lecture Notes in Educational Technology)

by Christina Hong Will W. K. Ma

This edited book seeks to evolve a global community of practice to share case studies, engage in critical discussion and spearhead thought leadership, to address the paradigm shift in next generation educational practice. This book showcases novel research studies in various forms and engenders interdisciplinary conversation and exchange concerning innovation, technology, and the role of applied education in workforce futures. It also equips readers with global perspectives on the latest developments in applied degree education and thinking on new education futures.

Information Security and Cryptology – ICISC 2020: 23rd International Conference, Seoul, South Korea, December 2–4, 2020, Proceedings (Lecture Notes in Computer Science #12593)

by Deukjo Hong

This book constitutes selected papers from the 23rd International Conference on Information Security and Cryptology, ICISC 2020, held in Seoul, South Korea, in December 2020. Due to the COVID-19, the confere was held online.The total of 15 papers presented in this volume were carefully reviewed and selected from 51 submissions. The aim of this conference was to provide an international forum for the latest results of research, development, and applications within the field of information security and cryptology.

Advances in Computational Toxicology: Methodologies and Applications in Regulatory Science (Challenges and Advances in Computational Chemistry and Physics #30)

by Huixiao Hong

This book provides a comprehensive review of both traditional and cutting-edge methodologies that are currently used in computational toxicology and specifically features its application in regulatory decision making. The authors from various government agencies such as FDA, NCATS and NIEHS industry, and academic institutes share their real-world experience and discuss most current practices in computational toxicology and potential applications in regulatory science. Among the topics covered are molecular modeling and molecular dynamics simulations, machine learning methods for toxicity analysis, network-based approaches for the assessment of drug toxicity and toxicogenomic analyses. Offering a valuable reference guide to computational toxicology and potential applications in regulatory science, this book will appeal to chemists, toxicologists, drug discovery and development researchers as well as to regulatory scientists, government reviewers and graduate students interested in this field.

Machine Learning and Deep Learning in Computational Toxicology (Computational Methods in Engineering & the Sciences)

by Huixiao Hong

This book is a collection of machine learning and deep learning algorithms, methods, architectures, and software tools that have been developed and widely applied in predictive toxicology. It compiles a set of recent applications using state-of-the-art machine learning and deep learning techniques in analysis of a variety of toxicological endpoint data. The contents illustrate those machine learning and deep learning algorithms, methods, and software tools and summarise the applications of machine learning and deep learning in predictive toxicology with informative text, figures, and tables that are contributed by the first tier of experts. One of the major features is the case studies of applications of machine learning and deep learning in toxicological research that serve as examples for readers to learn how to apply machine learning and deep learning techniques in predictive toxicology. This book is expected to provide a reference for practical applications of machine learning and deep learning in toxicological research. It is a useful guide for toxicologists, chemists, drug discovery and development researchers, regulatory scientists, government reviewers, and graduate students. The main benefit for the readers is understanding the widely used machine learning and deep learning techniques and gaining practical procedures for applying machine learning and deep learning in predictive toxicology.

Chinese Lexical Semantics: 22nd Workshop, CLSW 2021, Nanjing, China, May 15–16, 2021, Revised Selected Papers, Part I (Lecture Notes in Computer Science #13249)

by Jia-Fei Hong Minghui Dong Yanhui Gu

The two-volume proceedings, LNCS 13249 and 13250, constitutes the thoroughly refereed post-workshop proceedings of the 22nd Chinese Lexical Semantics Workshop, CLSW 2021, held in Nanjing, China in May 2021. The 68 full papers and 4 short papers were carefully reviewed and selected from 261 submissions. They are organized in the following topical sections: Lexical Semantics and General Linguistics; Natural Language Processing and Language Computing; Cognitive Science and Experimental Studies; Lexical Resources and Corpus Linguistics.

Chinese Lexical Semantics: 22nd Workshop, CLSW 2021, Nanjing, China, May 15–16, 2021, Revised Selected Papers, Part II (Lecture Notes in Computer Science #13250)

by Jia-Fei Hong Minghui Dong Yanhui Gu

This book constitutes the thoroughly refereed post-workshop proceedings of the 22nd Chinese Lexical Semantics Workshop, CLSW 2021, held in Nanjing, China in May 2021. The 68 full papers and 4 short papers included in this volume were carefully reviewed and selected from 261 submissions. They are organized in the following topical sections: Lexical Semantics and General Linguistics; Natural Language Processing and Language Computing; Cognitive Science and Experimental Studies; Lexical Resources and Corpus Linguistics.

Chinese Lexical Semantics: 19th Workshop, CLSW 2018, Chiayi, Taiwan, May 26–28, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11173)

by Jia-Fei Hong Qi Su Jiun-Shiung Wu

This book constitutes the thoroughly refereed post-workshop proceedings of the 19th Chinese Lexical Semantics Workshop, CLSW 2018, held in Chiayi, Taiwan, in May 2018. The 50 full papers and 19 short papers included in this volume were carefully reviewed and selected from 150 submissions. They are organized in the following topical sections: Lexical Semantics; Applications of Natural Language Processing; Lexical Resources; Corpus Linguistics.

Chinese Lexical Semantics: 20th Workshop, CLSW 2019, Beijing, China, June 28–30, 2019, Revised Selected Papers (Lecture Notes in Computer Science #11831)

by Jia-Fei Hong Yangsen Zhang Pengyuan Liu

This book constitutes the thoroughly refereed post-workshop proceedings of the 20th Chinese Lexical Semantics Workshop, CLSW 2019, held in Chiayi, Taiwan, in June 2019. The 39 full papers and 46 short papers included in this volume were carefully reviewed and selected from 254 submissions. They are organized in the following topical sections: lexical semantics; applications of natural language processing; lexical resources; corpus linguistics.

Practical Web Design: Learn the fundamentals of web design with HTML5, CSS3, Bootstrap, jQuery, and Vue.js

by Philippe Hong

A step by step guide for beginners to create interactive and dynamic websites from scratch.Key FeaturesA fun-filled book with incrementing projects that would help you learn and adapt the fundamentals of web developmentBring your web design to life with the help of HTML, CSS, JQuery, and learn to kick-start your future projects with BootstrapExplore popular web development techniques such as responsive, adaptive, and material design and initiate yourself with Vue.jsBook DescriptionWeb design is the process of creating websites. It encompasses several different aspects, including webpage layout, content production, and graphic design. This book offers you everything you need to know to build your websites. The book starts off by explaining the importance of web design and the basic design components used in website development. It'll show you insider tips to work quickly and efficiently with web technologies such as HTML5, CSS3, and JavaScript, concluding with a project on creating a static site with good layout. Once you've got that locked down, we'll get our hands dirty by diving straight into learning JavaScript and JQuery, ending with a project on creating dynamic content for your website. After getting our basic website up and running with the dynamic functionalities you'll move on to building your own responsive websites using more advanced techniques such as Bootstrap. Later you will learn smart ways to add dynamic content, and modern UI techniques such as Adaptive UI and Material Design. This will help you understand important concepts such as server-side rendering and UI components. Finally we take a look at various developer tools to ease your web development process.What you will learnUnderstand the importance of web design and the basic design componentsLearn HTML5 and CSS3Difference between adaptive and responsive web designLearn how to create your first websiteAdd interaction and dynamic content to your website with JavaScript and JQueryImplement Bootstrap Framework in your project Get familiar with server-side renderingWho this book is forThis book is for anyone who wants to learn about web development regardless of previous experience. It's perfect for complete beginners with zero experience; it's also great for anyone who does have some experience in a few technologies (such as HTML and CSS) but not all of them.

Advances in Multimedia Information Processing – PCM 2018: 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part II (Lecture Notes in Computer Science #11165)

by Richang Hong Wen-Huang Cheng Toshihiko Yamasaki Meng Wang Chong-Wah Ngo

The three-volume set LNCS 101164, 11165, and 11166 constitutes the refereed proceedings of the 19th Pacific-Rim Conference on Multimedia, PCM 2018, held in Hefei, China, in September 2018.The 209 regular papers presented together with 20 special session papers were carefully reviewed and selected from 452 submissions. The papers cover topics such as: multimedia content analysis; multimedia signal processing and communications; and multimedia applications and services.

Advances in Multimedia Information Processing – PCM 2018: 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part III (Lecture Notes in Computer Science #11166)

by Richang Hong Wen-Huang Cheng Toshihiko Yamasaki Meng Wang Chong-Wah Ngo

The three-volume set LNCS 101164, 11165, and 11166 constitutes the refereed proceedings of the 19th Pacific-Rim Conference on Multimedia, PCM 2018, held in Hefei, China, in September 2018.The 209 regular papers presented together with 20 special session papers were carefully reviewed and selected from 452 submissions. The papers cover topics such as: multimedia content analysis; multimedia signal processing and communications; and multimedia applications and services.

Advances in Multimedia Information Processing – PCM 2018: 19th Pacific-Rim Conference on Multimedia, Hefei, China, September 21-22, 2018, Proceedings, Part I (Lecture Notes in Computer Science #11164)

by Richang Hong Wen-Huang Cheng Toshihiko Yamasaki Meng Wang Chong-Wah Ngo

The three-volume set LNCS 101164, 11165, and 11166 constitutes the refereed proceedings of the 19th Pacific-Rim Conference on Multimedia, PCM 2018, held in Hefei, China, in September 2018.The 209 regular papers presented together with 20 special session papers were carefully reviewed and selected from 452 submissions. The papers cover topics such as: multimedia content analysis; multimedia signal processing and communications; and multimedia applications and services.

Refine Search

Showing 20,651 through 20,675 of 54,498 results