- Table View
- List View
Theory and Practice of Natural Computing: 10th International Conference, TPNC 2021, Virtual Event, December 7–10, 2021, Proceedings (Lecture Notes in Computer Science #13082)
by Claus Aranha Carlos Martín-Vide Miguel A. Vega-RodríguezThis book constitutes the refereed proceedings of the 10th International Conference on Theory and Practice of Natural Computing, TPNC 2021, held virtually, in December 2021. The 9 full papers presented together with 3 invited talks, in this book were carefully reviewed and selected from 14 submissions. The papers are organized in topical sections named Applications of Natural Computing, Deep Learning and Transfer Learning, Evolutionary and Swarm Algorithms.
Theory and Practice of Natural Computing
by Carlos Martín-Vide Luis Magdalena Adrian-Horia DediuThis book constitutes the refereed proceedings of the 4thInternational Conference on Theory and Practice of Natural Computing, TPNC2015, held in Mieres, Spain, in December 2015. The 12 revised full papers presented togetherwith 20 invited talks in this book were carefully reviewed and selected from 30submissions. The scope of TPNC is rather broad, containing topics of eithertheoretical, experimental or applied interest such as soft computing, computingarchitectures, and formal models.
Theory and Practice of Natural Computing: 9th International Conference, TPNC 2020, Taoyuan, Taiwan, December 7–9, 2020, Proceedings (Lecture Notes in Computer Science #12494)
by Carlos Martín-Vide Miguel A. Vega-Rodríguez Miin-Shen YangThis book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Natural Computing, TPNC 2020, held in Taoyuan, Taiwan, in December 2020. The 12 full papers presented in this book, together with one invited talk, were carefully reviewed and selected from 24 submissions. The papers are organized in topical sections named: applications of natural computing; quantum computing and unconventional computing; and swarm intelligence, evolutionary algorithms, and DNA computing.
Theory and Practice of Natural Computing
by Carlos Martín-Vide Roman Neruda Miguel A. Vega-RodríguezThis book constitutes the refereed proceedings of the 6th International Conference,on Theory and Practice of Natural Computing, TPNC 2017, held in Prague, Czech Republic, December 2017.The 22 full papers presented in this book, together with one invited talk, werecarefully reviewed and selected from 39 submissions. The papers are organized around the following topical sections: applications of natural computing; evolutionary computation; fuzzy logic; Molecular computation; neural networks; quantum computing.
Theory and Practice of Natural Computing: 8th International Conference, TPNC 2019, Kingston, ON, Canada, December 9–11, 2019, Proceedings (Lecture Notes in Computer Science #11934)
by Carlos Martín-Vide Geoffrey Pond Miguel A. Vega-RodríguezThis book constitutes the refereed proceedings of the 8th International Conference on Theory and Practice of Natural Computing, TPNC 2019, held in Kingston, ON, Canada, in December 2019. The 15 full papers presented in this book, together with two invited talk, were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections named: Applications of Natural Computing; Evolutionary Computation; Genetic Algorithms, Swarm Intelligence, and Heuristics; Quantum Computing and Information.
Theory and Practice of Natural Computing: 7th International Conference, TPNC 2018, Dublin, Ireland, December 12–14, 2018, Proceedings (Lecture Notes in Computer Science #11324)
by Michael O'Neill Carlos Martín-Vide Miguel A. Vega-Rodríguez David FaganThis book constitutes the refereed proceedings of the 7th International Conference on Theory and Practice of Natural Computing, TPNC 2017, held in Dublin, Ireland, in December 2018. The 35 full papers presented in this book, together with one invited talk, were carefully reviewed and selected from 69 submissions. The papers are organized around the following topical sections: applications of natural computing as algorithms, bioinformatics, control, cryptography, design, economics. The more theoretical contributions handle with artificial chemistry, artificial immune systems, artificial life, cellular automata, cognitive computing, cognitive engineering, cognitive robotics, collective behaviour, complex systems, computational intelligence, computational social science, computing with words, developmental systems, DNA computing, DNA nanotechnology, evolutionary algorithms, evolutionary computing, evolutionary game theory, fractal geometry, fuzzy control, fuzzy logic, fuzzy sets, fuzzy systems, genetic algorithms, genetic programming, granular computing, heuristics, intelligent agents, intelligent systems, machine intelligence, molecular programming, neural computing, neural networks, quantum communication, quantum computing, rough sets, self-assembly.
The Theory and Practice of Online Learning
by Terry AndersonIn this important collection of essays by practitioners and scholars that has been downloaded nearly half a million times is an overview of some of the most pressing issues in online education. By addressing transformations arising from educational technology advances and the new business conditions and modes of delivery of education, the contributors to The Theory and Practice of Online Learning provide insights into this complex, diverse, and rapidly evolving field.
Theory and Practice of Relational Databases
by Stefan Stanczyk Bob Champion Richard LeytonThe study of relationship databases is a core component of virtually every undergraduate computer science degree course. This new edition of Theory and Practice of Relationship Databases retains all the features that made the previous edition such as success, and goes on to give even more comprehensive and informative coverage.Written in a tutorial style and containing a great many examples and exercises as well as extensively using illustrative and explanatory graphics, the author has produced an undergraduate textbook of great depth and clarity that is very easy to follow. The subject of relational databases is brought to life by the writing style and the inclusion of an homogenous case study that reinforces the issues dealt with in each chapter.The primary objective of the book is to present a comprehensive explanation of the process of development of database application systems within the framework of a set processing paradigm. Since the majority of these applications are built as relationship systems, a complete though reasonably concise account of that model is presented. Dr. Stanczyk has achieved this by concentrating on the issues that contribute significantly to the application development while de-emphasizing purely theoretical aspects of the subject. This has led to an imaginative and highly practical textbook that will be an excellent read for the undergraduate computer science student.
The Theory and Practice of Social Machines (Lecture Notes in Social Networks)
by Nigel Shadbolt Kieron O’Hara David De Roure Wendy HallSocial machines are a type of network connected by interactive digital devices made possible by the ubiquitous adoption of technologies such as the Internet, the smartphone, social media and the read/write World Wide Web, connecting people at scale to document situations, cooperate on tasks, exchange information, or even simply to play. Existing social processes may be scaled up, and new social processes enabled, to solve problems, augment reality, create new sources of value, and disrupt existing practice.This book considers what talents one would need to understand or build a social machine, describes the state of the art, and speculates on the future, from the perspective of the EPSRC project SOCIAM – The Theory and Practice of Social Machines. The aim is to develop a set of tools and techniques for investigating, constructing and facilitating social machines, to enable us to narrow down pragmatically what is becoming a wide space, by asking ‘when will it be valuable to use these methods on a sociotechnical system?’ The systems for which the use of these methods adds value are social machines in which there is rich person-to-person communication, and where a large proportion of the machine’s behaviour is constituted by human interaction.
Theory and Practice of Wireless Sensor Networks: Cover, Sense, and Inform (Studies in Systems, Decision and Control #214)
by Habib M. AmmariThis book aims at developing a reader’s thorough understanding of the challenges and opportunities of two categories of networks, namely k-covered wireless sensor networks and k-barrier covered wireless sensor networks. It presents a variety of theoretical studies based on percolation theory, convexity theory, and applied computational geometry, as well as the algorithms and protocols that are essential to their design, analysis, and development. Particularly, this book focuses on the cover, sense, and inform (CSI) paradigm with a goal to build a unified framework, where connected k-coverage (or k-barrier coverage), sensor scheduling, and geographic data forwarding, gathering, and delivery are jointly considered. It provides the interested reader with a fine study of the above networks, which can be covered in introductory and advanced courses on wireless sensor networks. This book is useful to senior undergraduate and graduate students in computer science, computer engineering, electrical engineering, information science, information technology, mathematics, and any related discipline. Also, it is of interest to computer scientists, researchers, and practitioners in academia and industry with interest in these two networks from their deployment until data gathering and delivery.
The Theory and Practice of Writing Music for Games
by Steve Horowitz Scott R. LooneyThe nature of game music charges the modern-day composer with understanding a whole host of aesthetic and technical principles unique to the medium. Based on years of working in the field, as well as teaching the subject at colleges and universities, The Theory and Practice of Writing Music for Games is an invaluable resource for those looking for a classroom tested, directed course of study. As players and composers, themselves, authors Steve Horowitz and Scott R. Looney share the inspiration and joy of game music with an emphasis on critical thinking and the creative process, exploring the parallels and distinctions to concert music, film, TV, cartoons, and other popular forms. Each chapter builds on the next and guides the reader step by step through the essentials. Along with all the theory, a multitude of clearly defined hands-on projects and exercises are included, designed to prepare the reader to go out into the field with a complete understanding of the art and craft of music composition for games and visual media. Key Features:• Discusses a variety of topics in a simple and easy-to-understand format.• Provides a valuable resource for teachers and students, anyone who is looking to build a career in music for games.• Breaks down the fundamentals needed to build your career.• Includes fun and practical exercises that strengthen your composer chops.
Theory and Principled Methods for the Design of Metaheuristics
by Yossi Borenstein Alberto MoraglioMetaheuristics, and evolutionary algorithms in particular, are known to provide efficient, adaptable solutions for many real-world problems, but the often informal way in which they are defined and applied has led to misconceptions, and even successful applications are sometimes the outcome of trial and error. Ideally, theoretical studies should explain when and why metaheuristics work, but the challenge is huge: mathematical analysis requires significant effort even for simple scenarios and real-life problems are usually quite complex. In this book the editors establish a bridge between theory and practice, presenting principled methods that incorporate problem knowledge in evolutionary algorithms and other metaheuristics. The book consists of 11 chapters dealing with the following topics: theoretical results that show what is not possible, an assessment of unsuccessful lines of empirical research; methods for rigorously defining the appropriate scope of problems while acknowledging the compromise between the class of problems to which a search algorithm is applied and its overall expected performance; the top-down principled design of search algorithms, in particular showing that it is possible to design algorithms that are provably good for some rigorously defined classes; and, finally, principled practice, that is reasoned and systematic approaches to setting up experiments, metaheuristic adaptation to specific problems, and setting parameters. With contributions by some of the leading researchers in this domain, this book will be of significant value to scientists, practitioners, and graduate students in the areas of evolutionary computing, metaheuristics, and computational intelligence.
Theory, Design, and Applications of Unmanned Aerial Vehicles
by A. R. Jha, Ph.D.This book provides a complete overview of the theory, design, and applications of unmanned aerial vehicles. It covers the basics, including definitions, attributes, manned vs. unmanned, design considerations, life cycle costs, architecture, components, air vehicle, payload, communications, data link, and ground control stations. Chapters cover types and civilian roles, sensors and characteristics, alternative power, communications and data links, conceptual design, human machine interface, sense and avoid systems, civil airspace issues and integration efforts, navigation, autonomous control, swarming, and future capabilities.
Theory Informing and Arising from Learning Analytics
by Kathryn Bartimote Sarah K. Howard Dragan GaševićTheory Informing and Arising from Learning Analytics delves into the dynamic intersection of learning theory and educational data analysis within the field of Learning Analytics (LA). This groundbreaking book illuminates how theoretical insights can revolutionize data interpretation, reshape research methodologies, and expand the horizons of human learning and educational theory. Organized into three distinct sections, it offers a comprehensive introduction to the role of theory in LA, features contributions from leading scholars who apply diverse theoretical frameworks to their research, and explores cutting-edge topics where new theories are emerging. A standout feature is the inclusion of three “in conversation” chapters, where expert panels dive into the topics of ethics, self-regulated learning, and qualitative computation, enriched by accompanying podcasts that provide fresh, thought-provoking perspectives. This book is an invaluable resource for researchers, sparking debates on the evolving role of theory in LA and challenging conventional epistemological views. Published by Springer, it is an essential read for both aspiring and seasoned scholars eager to engage with the forefront of LA research.
Theory, Methodology, Tools and Applications for Modeling and Simulation of Complex Systems: 16th Asia Simulation Conference and SCS Autumn Simulation Multi-Conference, AsiaSim/SCS AutumnSim 2016, Beijing, China, October 8-11, 2016, Proceedings, Part I (Communications in Computer and Information Science #643)
by Lin Zhang Xiao Song Yunjie WuThis four-volume set (CCIS 643, 644, 645, 646) constitutes the refereed proceedings of the 16th Asia Simulation Conference and the First Autumn Simulation Multi-Conference, AsiaSim / SCS AutumnSim 2016, held in Beijing, China, in October 2016. The 265 revised full papers presented were carefully reviewed and selected from 651 submissions. The papers in this first volume of the set are organized in topical sections on modeling and simulation theory and methodology; model engineering for system of systems; high performance computing and simulation; modeling and simulation for smart city.
Theory of Computation: Automata, Formal Languages, Computation and Complexity
by K.R. ChowdharyThis book offers a fresh perspective on the study and teaching of the Theory of Computation. The author's selection of topics and the comprehensive set of questions demonstrate extensive knowledge and years of experience in both teaching and research. It addresses practical aspects of computing models that are often overlooked. The book's emphasis on pedagogy, through carefully crafted exercises and clear elucidation of learning outcomes and chapter summaries, is a refreshing approach to the subject. With the right platform, this book has the potential to be adopted as a textbook in universities worldwide. The book covers new developments not typically addressed in other texts on the subject, such as algebraic theory, new applications of finite automata and regular languages, and topics from compiler theory that are closely related. It also explores several new relationships among models, with a natural progression of chapters. Key strengths of this book include its coverage of contemporary and relevant topics, practical applications of theoretical concepts, an extended Chomsky Hierarchy, and discussions on decidability, undecidability, and unsolvability. The book is tailored for its intended audience, with selected chapters suitable for undergraduate B.Tech./B.E. computer science students. Additionally, Chapters 9–14 can be used for a course on "Advanced Topics in Theory of Computer Science" at the Master's level (M.E./M.Tech.). It also serves as a foundational resource for those engaged in research in computer science.
A Theory of Creative Thinking: Construction and Verification of the Dual Circulation Model (Lecture Notes in Educational Technology)
by Kekang HeThis book examines research on creative thinking, both current and historical. It explores two dimensions of human thought (time and space) and two modes of thinking (conscious and unconscious) as well as both left and right brain functions and artistic and scientific creative activities. The book proposes a "Double Circulation" model of creative thinking and argues that imagery thinking, intuitive thinking and logical thinking are main parts of creative thinking and that dialectical thinking and horizontal-vertical thinking are the guides for highly complex problem-solving thoughts and strategies. The book focuses on education and psychology and also covers how to use ICT to promote students' creative thinking skills. Researchers will benefit from the "Double Circulation" model, which provides a new perspective on conducting creative thinking research. The book is also a valuable resource for graduate students in the fields of educational technology and psychology and for all readers who are interested in creative thinking.
Theory of Cryptography: 16th International Conference, Tcc 2018, Panaji, India, November 11-14, 2018, Proceedings, Part Ii (Lecture Notes in Computer Science #11240)
by Amos Beimel Stefan DziembowskiThe two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
Theory of Cryptography: 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II (Lecture Notes in Computer Science #11240)
by Amos Beimel Stefan DziembowskiThe two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.The total of 50 revised full papers presented in the proceedings were carefully reviewed and selected from 168 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
Theory of Cryptography: 22nd International Conference, TCC 2024, Milan, Italy, December 2–6, 2024, Proceedings, Part III (Lecture Notes in Computer Science #15366)
by Elette Boyle Mohammad MahmoodyThe four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 172 submissions. They focus on topics such as: proofs; math and foundations; consensus and messaging; quantum; kolmogorov and OWFs; encryption; quantum and black-box separations; authentication and sequentiality; obfuscation and homomorphism; multi-party computation; information-theoretic cryptography; and secret sharing.
Theory of Cryptography: 22nd International Conference, TCC 2024, Milan, Italy, December 2–6, 2024, Proceedings, Part II (Lecture Notes in Computer Science #15365)
by Elette Boyle Mohammad MahmoodyThe four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 172 submissions. They focus on topics such as: proofs; math and foundations; consensus and messaging; quantum; kolmogorov and OWFs; encryption; quantum and black-box separations; authentication and sequentiality; obfuscation and homomorphism; multi-party computation; information-theoretic cryptography; and secret sharing.
Theory of Cryptography: 22nd International Conference, TCC 2024, Milan, Italy, December 2–6, 2024, Proceedings, Part IV (Lecture Notes in Computer Science #15367)
by Elette Boyle Mohammad MahmoodyThe four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 172 submissions. They focus on topics such as: proofs; math and foundations; consensus and messaging; quantum; kolmogorov and OWFs; encryption; quantum and black-box separations; authentication and sequentiality; obfuscation and homomorphism; multi-party computation; information-theoretic cryptography; and secret sharing.
Theory of Cryptography: 22nd International Conference, TCC 2024, Milan, Italy, December 2–6, 2024, Proceedings, Part I (Lecture Notes in Computer Science #15364)
by Elette Boyle Mohammad MahmoodyThe four-volume set LNCS 15364-15367 constitutes the refereed proceedings of the 22nd International Conference on Theory of Cryptography, TCC 2024, held in Milan, Italy, in December 2024. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 172 submissions. They focus on topics such as: proofs; math and foundations; consensus and messaging; quantum; kolmogorov and OWFs; encryption; quantum and black-box separations; authentication and sequentiality; obfuscation and homomorphism; multi-party computation; information-theoretic cryptography; and secret sharing.
Theory of Cryptography: 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part I (Lecture Notes in Computer Science #11891)
by Dennis Hofheinz Alon RosenThe two-volume set LNCS 11891 and 11892 constitutes the proceedings of the 17th International Conference on Theory of Cryptography, TCC 2019, held in Nuremberg, Germany, in December 2019.The 43 full papers presented were carefully reviewed and selected from 147 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.
Theory of Cryptography: 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part II (Lecture Notes in Computer Science #11892)
by Dennis Hofheinz Alon RosenThe two-volume set LNCS 11891 and 11892 constitutes the proceedings of the 17th International Conference on Theory of Cryptography, TCC 2019, held in Nuremberg, Germany, in December 2019.The 43 full papers presented were carefully reviewed and selected from 147 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.