Browse Results

Showing 12,626 through 12,650 of 61,912 results

Computer Analysis of Images and Patterns: 19th International Conference, CAIP 2021, Virtual Event, September 28–30, 2021, Proceedings, Part II (Lecture Notes in Computer Science #13053)

by Mario Vento Nicolas Tsapatsoulis Andreas Panayides Theo Theocharides Andreas Lanitis Constantinos Pattichis

The two volume set LNCS 13052 and 13053 constitutes the refereed proceedings of the 19th International Conference on Computer Analysis of Images and Patterns, CAIP 2021, held virtually, in September 2021. The 87 papers presented were carefully reviewed and selected from 129 submissions. The papers are organized in the following topical sections across the 2 volumes: 3D vision, biomedical image and pattern analysis; machine learning; feature extractions; object recognition; face and gesture, guess the age contest, biometrics, cryptography and security; and segmentation and image restoration.

Computer Analysis of Images and Patterns: 20th International Conference, CAIP 2023, Limassol, Cyprus, September 25–28, 2023, Proceedings, Part I (Lecture Notes in Computer Science #14184)

by Efthyvoulos Kyriacou Nicolas Tsapatsoulis Andreas Panayides Andreas Lanitis Constantinos Pattichis Marios Pattichis Christos Kyrkou Zenonas Theodosiou

This volume LNCS 14184 and 14185 constitutes the refereed proceedings of the 20th International Conference, CAIP 2023, in Limassol, Cyprus, in September 2023. The 54 full papers presented were carefully reviewed and selected from 67 submissions. They were organized in the following section as follows:Part I-:PAR Contest 2023; Deep Learning; Machine Learning for Image and Pattern Analysis; and Object Recognition and Segmentation.Part II : Biometrics- Human Pose Estimation- Action Recognition; Biomedical Image and Pattern Analysis; and General Vision- AI Applications.

Computer Analysis of Images and Patterns: 20th International Conference, CAIP 2023, Limassol, Cyprus, September 25–28, 2023, Proceedings, Part II (Lecture Notes in Computer Science #14185)

by Efthyvoulos Kyriacou Nicolas Tsapatsoulis Andreas Panayides Andreas Lanitis Constantinos Pattichis Marios Pattichis Christos Kyrkou Zenonas Theodosiou

This volume LNCS 14184 and 14185 constitutes the refereed proceedings of the 20th International Conference, CAIP 2023, in Limassol, Cyprus, in September 2023. The 54 full papers presented were carefully reviewed and selected from 67 submissions. They were organized in the following section as follows:Part I: PAR Contest 2023; Deep Learning; Machine Learning for Image and Pattern Analysis; and Object Recognition and Segmentation.Part II : Biometrics- Human Pose Estimation- Action Recognition; Biomedical Image and Pattern Analysis; and General Vision- AI Applications.

Computer Analysis of Images and Patterns: CAIP 2019 International Workshops, ViMaBi and DL-UAV, Salerno, Italy, September 6, 2019, Proceedings (Communications in Computer and Information Science #1089)

by Mario Vento Gennaro Percannella Sara Colantonio Daniela Giorgi Bogdan J. Matuszewski Hamideh Kerdegari Manzoor Razaak

This book constitutes the refereed proceedings of two workshops held at the 18th International Conference on Computer Analysis of Images and Patterns, CAIP 2019, held in Salerno, Italy, in September 2019: First Workshop on Deep-learning based Computer Vision for UAV, DL-UAV 2019, and the First Workshop on Visual Computing and Machine Learning for Biomedical Applications, ViMaBi 2019. The 12 papers presented in this volume were carefully reviewed and selected from 16 submissions and focus on all aspects of visual computing and machine learning for biomedical applications, and deep-learning based computer vision for UAV.

Computer Animation (Kaleidoscope)

by Darcy Lockman

Explains how computer animation is used to make entire films, indicates how it differs from traditional animation, and includes information on the development of that technology.

Computer Animation and Social Agents: 33rd International Conference on Computer Animation and Social Agents, CASA 2020, Bournemouth, UK, October 13-15, 2020, Proceedings (Communications in Computer and Information Science #1300)

by Daniel Thalmann Feng Tian Nadia Magnenat Thalmann Jian Chang Jian Jun Zhang Xiaosong Yang Weiwei Xu

This book constitutes the revised selected papers of the 33rd International Conference on Computer Animation and Social Agents, CASA 2020, held in Bournemouth, UK*, in October 2020.The 1 full paper and 13 short papers presented were carefully reviewed and selected from a total of 86 submissions. The papers are organized in topical sections of modelling, animation and simulation; virtual reality; image processing and computer vision.*The conference was held virtually due to the COVID-19 pandemic.

Computer Animation and Social Agents: 37th International Conference, CASA 2024, Wuhan, China, June 5–7, 2024, Revised Selected Papers, Part I (Communications in Computer and Information Science #2374)

by Daniel Thalmann Lei Zhu Nadia Magnenat Thalmann Jin Huang Bin Sheng Xinrong Hu Tao Peng Weiliang Meng Xiong Wei

This two-volume set, CCIS 2374 and CCIS 2375, constitutes the revised selected papers from the 37th International Conference on Computer Animation and Social Agents, CASA 2024, held in Wuhan, China, during June 5-7, 2024. The 60 papers presented in these two volumes were carefully reviewed and selected from 208 submissions. These papers focus on various aspects of Computer Animation and Social Agents, such as Motion Capture & Retargeting, Physics-based Animation, Vision-based Techniques, Behavioral Animation, Facial Animation, Image-based Animation, Virtual Humans, Crowd Simulation, AI-based Animation, Deep Learning methods, Virtual humans and avatars, and 3D Physiological Humans.

Computer Animation and Social Agents: 37th International Conference, CASA 2024, Wuhan, China, June 5–7, 2024, Revised Selected Papers, Part II (Communications in Computer and Information Science #2375)

by Daniel Thalmann Lei Zhu Nadia Magnenat Thalmann Jin Huang Bin Sheng Xinrong Hu Tao Peng Weiliang Meng Xiong Wei

This two-volume set, CCIS 2374 and CCIS 2375, constitutes the revised selected papers from the 37th International Conference on Computer Animation and Social Agents, CASA 2024, held in Wuhan, China, during June 5-7, 2024. The 60 papers presented in these two volumes were carefully reviewed and selected from 208 submissions. These papers focus on various aspects of Computer Animation and Social Agents, such as Motion Capture & Retargeting, Physics-based Animation, Vision-based Techniques, Behavioral Animation, Facial Animation, Image-based Animation, Virtual Humans, Crowd Simulation, AI-based Animation, Deep Learning methods, Virtual humans and avatars, and 3D Physiological Humans.

Computer Applications for Business: Step-by-step Exercises and Applications

by Iris Blanc

Computer Applications for Business will introduce you to word processing, spreadsheet, database and desktop presentation concepts through sequential practice material. Most of the exercises relate to computers. Consequently, while you are doing the exercises, you are also learning about computers. The exercises proceed from basic to intermediate level. Since this book is generic, it may be used with any software or computer. There are five chapters in this book: 1. Word Processing, 2. Spreadsheet, 3. Database, 4. Integration, and 5. Desktop Publishing.

Computer Applications for Handling Legal Evidence, Police Investigation and Case Argumentation (Law, Governance and Technology Series #5)

by Ephraim Nissan

This book provides an overview of computer techniques and tools -- especially from artificial intelligence (AI) -- for handling legal evidence, police intelligence, crime analysis or detection, and forensic testing, with a sustained discussion of methods for the modelling of reasoning and forming an opinion about the evidence, methods for the modelling of argumentation, and computational approaches to dealing with legal, or any, narratives. By the 2000s, the modelling of reasoning on legal evidence has emerged as a significant area within the well-established field of AI & Law. An overview such as this one has never been attempted before. It offers a panoramic view of topics, techniques and tools. It is more than a survey, as topic after topic, the reader can get a closer view of approaches and techniques. One aim is to introduce practitioners of AI to the modelling legal evidence. Another aim is to introduce legal professionals, as well as the more technically oriented among law enforcement professionals, or researchers in police science, to information technology resources from which their own respective field stands to benefit. Computer scientists must not blunder into design choices resulting in tools objectionable for legal professionals, so it is important to be aware of ongoing controversies. A survey is provided of argumentation tools or methods for reasoning about the evidence. Another class of tools considered here is intended to assist in organisational aspects of managing of the evidence. Moreover, tools appropriate for crime detection, intelligence, and investigation include tools based on link analysis and data mining. Concepts and techniques are introduced, along with case studies. So are areas in the forensic sciences. Special chapters are devoted to VIRTOPSY (a procedure for legal medicine) and FLINTS (a tool for the police). This is both an introductory book (possibly a textbook), and a reference for specialists from various quarters.

Computer Applications in Engineering and Management (Chapman & Hall/Distributed Computing and Intelligent Data Analytics Series)

by Parveen Berwal

The book Computer Applications in Engineering and Management is about computer applications in management, electrical engineering, electronics engineering, and civil engineering. It covers the software tools for office automation, introduces the basic concepts of database management, and provides an overview about the concepts of data communication, internet, and e-commerce. Additionally, the book explains the principles of computing management used in construction of buildings in civil engineering and the role of computers in power grid automation in electronics engineering. Features Provides an insight to prospective research and application areas related to industry and technology Includes industry-based inputs Provides a hands-on approach for readers of the book to practice and assimilate learning This book is primarily aimed at undergraduates and graduates in computer science, information technology, civil engineering, electronics and electrical engineering, management, academicians, and research scholars.

Computer Applications in Industry and Engineering: 37th International Conference, CAINE 2024, San Diego, CA, USA, October 21–22, 2024, Proceedings (Communications in Computer and Information Science #2242)

by Indranil Roy Gongzhu Hu Krishna K. Kambhampaty

This book constitutes the proceedings of the 37th International Conference on Computer Applications in Industry and Engineering, CAINE 2024, which took place in San Diego, USA, in October 2024. The 17 full papers presented in these proceedings were carefully reviewed and selected for inclusion in the book. They were organized in topical sections as follows: Machine learning and AP applications; blockchain and security; parallel computing and algorithms; data processing and image analysis; networking and edge computing; and cryptography and pseudorandom generators.

Computer Applications: 38th CCF Conference of Computer Applications, CCF NCCA 2023, Suzhou, China, July 16–20, 2023, Proceedings, Part I (Communications in Computer and Information Science #1959)

by Min Zhang Junyu Lin Xianhua Song Zeguang Lu Fuyuan Hu Bin Xu

The two-volume set CCIS 1959 and 1960 constitutes the refereed post-conference proceedings of the 38th CCF National Conference on Computer Applications, CCF NCCA 2023, held in Suzhou, China, during July 16–20, 2023.The 39 revised full papers presented in these proceedings were carefully reviewed and selected from 197 submissions. The papers are organized in the following topical sections:Volume I:Artificial intelligence and application.Volume II:Data science and technology; pattern recognition and machine learning; network communication and security; frontier and comprehensive applications.

Computer Applications: 38th CCF Conference of Computer Applications, CCF NCCA 2023, Suzhou, China, July 16–20, 2023, Proceedings, Part II (Communications in Computer and Information Science #1960)

by Min Zhang Junyu Lin Xianhua Song Zeguang Lu Fuyuan Hu Bin Xu

The two-volume set CCIS 1959 and 1960 constitutes the refereed post-conference proceedings of the 38th CCF National Conference on Computer Applications, CCF NCCA 2023, held in Suzhou, China, during July 16–20, 2023.The 39 revised full papers presented in these proceedings were carefully reviewed and selected from 197 submissions. The papers are organized in the following topical sections:Volume I:Artificial intelligence and application.Volume II:Data science and technology; pattern recognition and machine learning; network communication and security; frontier and comprehensive applications.

Computer Applications: 39th CCF National Conference of Computer Applications, CCF NCCA 2024, Harbin, China, July 15–18, 2024, Proceedings, Part I (Communications in Computer and Information Science #2274)

by Weipeng Jing Xianhua Song Zeguang Lu Lan Huang Haipeng Yu Chengtao Cai Xuebin Chen

This two-volume set, CCIS 2274 and CCIS 2275, constitutes the refereed proceedings of the 39th National Conference on China Computer Federation, CCF NCCA 2024, held in Harbin, China, during July 15–18, 2024. The 48 full papers presented here were carefully reviewed and selected from 238 submissions. These papers are organized in the following topical sections: Part I: Artificial Intelligence and Applications; Data Science and Technology. Part II: Pattern Recognition & Machine Learning; Network Communication and Security; Frontier and Comprehensive Applications; Data Science and Technology.

Computer Applications: 39th CCF National Conference of Computer Applications, CCF NCCA 2024, Harbin, China, July 15–18, 2024, Proceedings, Part II (Communications in Computer and Information Science #2275)

by Weipeng Jing Xianhua Song Zeguang Lu Lan Huang Haipeng Yu Chengtao Cai Xuebin Chen

This two-volume set, CCIS 2274 and CCIS 2275, constitutes the refereed proceedings of the 39th National Conference on China Computer Federation, CCF NCCA 2024, held in Harbin, China, during July 15–18, 2024. The 48 full papers presented here were carefully reviewed and selected from 238 submissions. These papers are organized in the following topical sections: Part I: Artificial Intelligence and Applications; Data Science and Technology. Part II: Pattern Recognition & Machine Learning; Network Communication and Security; Frontier and Comprehensive Applications; Data Science and Technology.

Computer Architecture

by Gérard Blanchet Bertrand Dupouy

This book lays out the concepts necessary to understand how a computer works.For reasons of clarity, the authors have deliberately chosen examples that apply to machines from all eras, without having to water down the contents of the book. This choice helps to show how techniques, concepts and performances have evolved since the first computers.The book is divided into five parts. The first four, which are of increasing difficulty, are the core of the book: "Elements of a Basic Architecture", "Programming Model and Operation", "Memory Hierarchy", "Parallelism and Performance Enhancement". The final part provides hints and solutions to the exercises in the book as well as appendices. The reader may approach each part independently based on their prior knowledge and goals.

Computer Architecture

by Charles Fox

Not since the 1980s has computer architecture been so exciting! This book captures the moment, mining the history of computing to teach key concepts in modern hardware design and introduce the neural and quantum architectures of the future.Computer Architecture is an in-depth exploration of the principles and designs that have shaped computer hardware through the ages, from counting devices like the abacus, to Babbage&’s Difference Engine, to modern GPUs and the frontiers of quantum computing.This engaging blend of history, theory, hands-on exercises, and real-world examples is sure to make for an insightful romp through a fast-changing world. You won&’t just read about computer architecture, you&’ll also gain the understanding to touch, build, and program it. You&’ll explore the basic structures of a CPU by learning to program a Victorian Analytical Engine. You&’ll extend electronic machines to 8-bit and 16-bit retro gaming computers, learning to program a Commodore 64 and an Amiga. You&’ll delve into x86 and RISC-V architectures, cloud and supercomputers, and ideas for future technologies. You&’ll also learn:• How to represent data with different coding schemes and build digital logic gates • The basics of machine and assembly language programming• How pipelining, out-of-order execution, and parallelism work, in context• The power and promise of neural networks, DNA, photonics, and quantum computing Whether you&’re a student, a professional, or simply a tech enthusiast, after reading this book, you&’ll grasp the milestones of computer architecture and be able to engage directly with the technology that defines today&’s world. Prepare to be inspired, challenged, and above all, see and experience the digital world, hands-on.

Computer Architecture and Organization: Fundamentals and Architecture Security

by Shuangbao Paul Wang

In today’s workplace, computer and cybersecurity professionals must understand both hardware and software to deploy effective security solutions. This book introduces readers to the fundamentals of computer architecture and organization for security, and provides them with both theoretical and practical solutions to design and implement secure computer systems. Offering an in-depth and innovative introduction to modern computer systems and patent-pending technologies in computer security, the text integrates design considerations with hands-on lessons learned to help practitioners design computer systems that are immune from attacks. Studying computer architecture and organization from a security perspective is a new area. There are many books on computer architectures and many others on computer security. However, books introducing computer architecture and organization with security as the main focus are still rare. This book addresses not only how to secure computer components (CPU, Memory, I/O, and network) but also how to secure data and the computer system as a whole. It also incorporates experiences from the author’s recent award-winning teaching and research. The book also introduces the latest technologies, such as trusted computing, RISC-V, QEMU, cache security, virtualization, cloud computing, IoT, and quantum computing, as well as other advanced computing topics into the classroom in order to close the gap in workforce development. The book is chiefly intended for undergraduate and graduate students in computer architecture and computer organization, as well as engineers, researchers, cybersecurity professionals, and middleware designers.

Computer Architecture and Security: Fundamentals of Designing Secure Computer Systems (Wiley-hep Information Security Ser.)

by Shuangbao Paul Wang Robert S. Ledley

The first book to introduce computer architecture for security and provide the tools to implement secure computer systems This book provides the fundamentals of computer architecture for security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer science and security professionals to understand both hardware and software security solutions to survive in the workplace. Examination of memory, CPU architecture and system implementation Discussion of computer buses and a dual-port bus interface Examples cover a board spectrum of hardware and software systems Design and implementation of a patent-pending secure computer system Includes the latest patent-pending technologies in architecture security Placement of computers in a security fulfilled network environment Co-authored by the inventor of the modern Computed Tomography (CT) scanner Provides website for lecture notes, security tools and latest updates

Computer Architecture: A Quantitative Approach (The Morgan Kaufmann Series in Computer Architecture and Design)

by David A. Patterson John L. Hennessy

Computer Architecture: A Quantitative Approach, Sixth Edition has been considered essential reading by instructors, students and practitioners of computer design for over 20 years. The sixth edition of this classic textbook from Hennessy and Patterson, winners of the 2017 ACM A.M. Turing Award recognizing contributions of lasting and major technical importance to the computing field, is fully revised with the latest developments in processor and system architecture. <p><p>The text now features examples from the RISC V (RISC Five) instruction set architecture, a modern RISC instruction set developed and designed to be a free and openly adoptable standard. It also includes a new chapter on domain specific architectures and an updated chapter on warehouse scale computing that features the first public information on Google's newest WSC.

Computer Architecture: Fundamentals and Principles of Computer Design

by Joseph D. Dumas II

Future computing professionals must become familiar with historical computer architectures because many of the same or similar techniques are still being used and may persist well into the future. Computer Architecture: Fundamentals and Principles of Computer Design discusses the fundamental principles of computer design and performance enhancement that have proven effective and demonstrates how current trends in architecture and implementation rely on these principles while expanding upon them or applying them in new ways. Rather than focusing on a particular type of machine, this textbook explains concepts and techniques via examples drawn from various architectures and implementations. When necessary, the author creates simplified examples that clearly explain architectural and implementation features used across many computing platforms. Following an introduction that discusses the difference between architecture and implementation and how they relate, the next four chapters cover the architecture of traditional, single-processor systems that are still, after 60 years, the most widely used computing machines. The final two chapters explore approaches to adopt when single-processor systems do not reach desired levels of performance or are not suited for intended applications. Topics include parallel systems, major classifications of architectures, and characteristics of unconventional systems of the past, present, and future.This textbook provides students with a thorough grounding in what constitutes high performance and how to measure it, as well as a full familiarity in the fundamentals needed to make systems perform better. This knowledge enables them to understand and evaluate the many new systems they will encounter throughout their professional careers.

Computer Architecture: Fundamentals and Principles of Computer Design, Second Edition

by Joseph D. Dumas II

Not only does almost everyone in the civilized world use a personal computer, smartphone, and/or tablet on a daily basis to communicate with others and access information, but virtually every other modern appliance, vehicle, or other device has one or more computers embedded inside it. One cannot purchase a current-model automobile, for example, without several computers on board to do everything from monitoring exhaust emissions, to operating the anti-lock brakes, to telling the transmission when to shift, and so on. Appliances such as clothes washers and dryers, microwave ovens, refrigerators, etc. are almost all digitally controlled. Gaming consoles like Xbox, PlayStation, and Wii are powerful computer systems with enhanced capabilities for user interaction. Computers are everywhere, even when we don’t see them as such, and it is more important than ever for students who will soon enter the workforce to understand how they work. This book is completely updated and revised for a one-semester upper level undergraduate course in Computer Architecture, and suitable for use in an undergraduate CS, EE, or CE curriculum at the junior or senior level. Students should have had a course(s) covering introductory topics in digital logic and computer organization. While this is not a text for a programming course, the reader should be familiar with computer programming concepts in at least one language such as C, C++, or Java. Previous courses in operating systems, assembly language, and/or systems programming would be helpful, but are not essential.

Computer Architecture: Software Aspects, Coding, and Hardware (Telecommunications And Networking Library)

by John Y. Hsu

With the new developments in computer architecture, fairly recent publications can quickly become outdated. Computer Architecture: Software Aspects, Coding, and Hardware takes a modern approach. This comprehensive, practical text provides that critical understanding of a central processor by clearly detailing fundamentals, and cutting edge design features. With its balanced software/hardware perspective and its description of Pentium processors, the book allows readers to acquire practical PC software experience. The text presents a foundation-level set of ideas, design concepts, and applications that fully meet the requirements of computer organization and architecture courses.The book features a "bottom up" computer design approach, based upon the author's thirty years experience in both academe and industry. By combining computer engineering with electrical engineering, the author describes how logic circuits are designed in a CPU. The extensive coverage of a micprogrammed CPU and new processor design features gives the insight of current computer development. Computer Architecture: Software Aspects, Coding, and Hardware presents a comprehensive review of the subject, from beginner to advanced levels. Topics include:o Two's complement numbers o Integer overflow o Exponent overflow and underflow o Looping o Addressing modes o Indexing o Subroutine linking o I/O structures o Memory mapped I/O o Cycle stealing o Interrupts o Multitasking o Microprogrammed CPU o Multiplication tree o Instruction queue o Multimedia instructions o Instruction cache o Virtual memory o Data cache o Alpha chip o Interprocessor communications o Branch prediction o Speculative loading o Register stack o JAVA virtual machine o Stack machine principles

Computer Arithmetic Algorithms

by Israel Koren

This text explains the fundamental principles of algorithms available for performing arithmetic operations on digital computers. These include basic arithmetic operations like addition, subtraction, multiplication, and division in fixed-point and floating-point number systems as well as more complex operations such as square root extraction and evaluation of exponential, logarithmic, and trigonometric functions. The algorithms described are independent of the particular technology employed for their implementation.

Refine Search

Showing 12,626 through 12,650 of 61,912 results