Service Alert
Entretien du site web le 24 avril à 22h HAE
Le site web sera indisponible le 24 avril à 22h HAE pour 15 minutes en raison de travail d'entretien prévu.
Le site web sera indisponible le 24 avril à 22h HAE pour 15 minutes en raison de travail d'entretien prévu.
Articles 1 à 20 sur 2638
Par Mojang Ab, The Official Minecraft Team. 2017
With insider gaming info and tips, this is the official, definitive, fully illustrated guide to mobs—and how to outsmart them—in…
Minecraft. Minecraft: Mobestiary reveals the secrets of every mob in the game. You’ll find little-known facts about passive, neutral, hostile, utility, and boss mobs, as well as more general information about their locations, behaviors, threat levels, and drops. Written by Alex Wiltshire, author of Minecraft: Blockopedia and former editor at Edge magazine, who has made it his life’s work to study Minecraft’s mobs. Illustrated with field sketches throughout by Anton Stenvall.Par Jiawei Han, Jian Pei, Hanghang Tong. 2023
Data Mining: Concepts and Techniques, Fourth Edition introduces concepts, principles, and methods for mining patterns, knowledge, and models from various…
kinds of data for diverse applications. Specifically, it delves into the processes for uncovering patterns and knowledge from massive collections of data, known as knowledge discovery from data, or KDD. It focuses on the feasibility, usefulness, effectiveness, and scalability of data mining techniques for large data sets. After an introduction to the concept of data mining, the authors explain the methods for preprocessing, characterizing, and warehousing data. They then partition the data mining methods into several major tasks, introducing concepts and methods for mining frequent patterns, associations, and correlations for large data sets; data classification and model construction; cluster analysis; and outlier detection. Concepts and methods for deep learning are systematically introduced as one chapter. Finally, the book covers the trends, applications, and research frontiers in data mining. Presents a comprehensive new chapter on deep learning, including improving training of deep learning models, convolutional neural networks, recurrent neural networks, and graph neural networks. Addresses advanced topics in one dedicated chapter: data mining trends and research frontiers, including mining rich data types (text, spatiotemporal data, and graph/networks), data mining applications (such as sentiment analysis, truth discovery, and information propagation), data mining methodologies and systems, and data mining and society. Provides a comprehensive, practical look at the concepts and techniques needed to get the most out of your dataPar Newton Lee. 2024
Encyclopedia of Computer Graphics and Games (ECGG) is a unique reference resource tailored to meet the needs of research and applications…
for industry professionals and academic communities worldwide. The ECGG covers the history, technologies, and trends of computer graphics and games.EditorNewton Lee, Institute for Education, Research, and Scholarships, Los Angeles, CA, USA Academic Co-ChairsShlomo Dubnov, Department of Music and Computer Science and Engineering, University of California San Diego, San Diego, CA, USAPatrick C. K. Hung, University of Ontario Institute of Technology, Oshawa, ON, CanadaJaci Lee Lederman, Vincennes University, Vincennes, IN, USAIndustry Co-ChairsShuichi Kurabayashi, Cygames, Inc. & Keio University, Kanagawa, JapanXiaomao Wu, Gritworld GmbH, Frankfurt am Main, Hessen, Germany Editorial Board MembersLeigh Achterbosch, School of Science, Engineering, IT and Physical Sciences, Federation University Australia Mt Helen, Ballarat, VIC, AustraliaRamazan S. Aygun, Department of Computer Science, Kennesaw State University, Marietta, GA, USABarbaros Bostan, BUG Game Lab, Bahçeşehir University (BAU), Istanbul, TurkeyAnthony L. Brooks, Aalborg University, Aalborg, DenmarkGuven Catak, BUG Game Lab, Bahçeşehir University (BAU), Istanbul, TurkeyAlvin Kok Chuen Chan, Cambridge Corporate University, Lucerne, SwitzerlandAnirban Chowdhury, Department of User Experience and Interaction Design, School of Design (SoD), University of Petroleum and Energy Studies (UPES), Dehradun, Uttarakhand, IndiaSaverio Debernardis, Dipartimento di Meccanica, Matematica e Management, Politecnico di Bari, Bari, ItalyAbdennour El Rhalibi, Liverpool John Moores University, Liverpool, UKStefano Ferretti, Department of Computer Science and Engineering, University of Bologna, Bologna, ItalyHan Hu, School of Information and Electronics, Beijing Institute of Technology, Beijing, ChinaMs. Susan Johnston, Select Services Films Inc., Los Angeles, CA, USAChris Joslin, Carleton University, Ottawa, CanadaSicilia Ferreira Judice, Department of Computer Science, University of Calgary, Calgary, CanadaHoshang Kolivand, Department Computer Science, Faculty of Engineering and Technology, Liverpool John Moores University, Liverpool, UKDario Maggiorini, Department of Computer Science, University of Milan, Milan, ItalyTim McGraw, Purdue University, West Lafayette, IN, USAGeorge Papagiannakis, ORamaVR S.A., Heraklion, Greece; FORTH-ICS, Heraklion Greece University of Crete, Heraklion, GreeceFlorian Richoux, Nantes Atlantic Computer Science Laboratory (LINA), Université de Nantes, Nantes, FranceAndrea Sanna, Dipartimento di Automatica e Informatica, Politecnico di Torino, Turin, ItalyYann Savoye, Institut fur Informatik, Innsbruck University, Innsbruck, AustriaSercan Şengün, Wonsook Kim School of Art, Illinois State University, Normal, IL, USARuck Thawonmas, Ritsumeikan University, Shiga, JapanVinesh Thiruchelvam, Asia Pacific University of Technology & Innovation, Kuala Lumpur, MalaysiaRojin Vishkaie, Amazon, Seattle, WA, USADuncan A. H. Williams, Digital Creativity Labs, Department of Computer Science, University of York, York, UKSai-Keung Wong, National Chiao Tung University, Hsinchu, TaiwanEditorial Board InternSaPar Joseph Migga Kizza. 2024
This timely textbook presents a comprehensive guide to the core topics in computing and information security and assurance realms, going…
beyond the security of networks to the ubiquitous mobile communications and online social networks that have become part of daily life.In the context of growing human dependence on a digital ecosystem, this book stresses the importance of security awareness—whether in homes, businesses, or public spaces. It also embraces the new and more agile and artificial-intelligence-boosted computing systems models, online social networks, and virtual platforms that are interweaving and fueling growth of an ecosystem of intelligent digital and associated social networks. This fully updated edition features new material on new and developing artificial intelligence models across all computing security systems spheres, blockchain technology, and the metaverse, leading toward security systems virtualizations.Topics and features:Explores the range of risks and vulnerabilities in all connected digital systemsPresents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projectsDescribes the fundamentals of traditional computer network security, and common threats to securityDiscusses the role and challenges of artificial intelligence in advancing the security of computing systems’ algorithms, protocols, and best practicesRaises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and securityOffers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestionsThis important textbook/reference is an invaluable resource for students of computer science, engineering, and information management, as well as for practitioners working in data- and information-intensive industries.Professor Joseph Migga Kizza is a professor, former Head of the Department of Computer Science and Engineering, and a former Director of the UTC InfoSec Center, at the University of Tennessee at Chattanooga, USA. He also authored the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethical and Secure Computing: A Concise Module.Par Horst Czichos. 2023
Dieses prägnante Lehrbuch führt einen Systemansatz in die Technik ein und beschreibt tribologische, mechatronische und cyber-physikalische Systeme sowie das technologische…
Konzept der Industrie 4.0 für Studierende verschiedener technischer Fachrichtungen. "Technologie" bezieht sich in diesem Buch auf die Gesamtheit der vom Menschen geschaffenen, nutzenorientierten Produkte, die auf technischen Kombinationen von Material, Energie und Information basieren. Dr. Czichos untersucht Technologie in diesem Band im Kontext des Systemdenkens im Hinblick auf die folgenden Haupttechnologiebereiche:Technische Systeme mit "interagierenden Oberflächen in Relativbewegung", insbesondere im Maschinenbau, in der Produktion und im Transportwesen; einschließlich der Analyse von reibungsbedingten Energieverlusten und verschleißbedingter Materialdissipation. Technische Systeme, die eine Kombination aus Mechanik, Elektronik, Steuerung und Computertechnik für die Bedürfnisse von Industrie und Gesellschaft erfordern. Technische Systeme mit einer Kombination aus Mechatronik und Internetkommunikation. Cyber-physikalische Systeme für die Digitalisierung der Industrie im Entwicklungsprojekt Industrie 4.0.Betrachtet Technik als Kombination aus der physischen Welt und der digitalen virtuellen Welt der Information und Kommunikation.Beschreibt den Produktzyklus von technischen Systemen und die Eckpfeiler der Technik: Material, Energie und Information.Stellt eine ganzheitliche Betrachtung von Technik und Engineering dar.This book constitutes the refereed proceedings of the 8th International Conference on Internet on Things, ICIOT 2023, held as part…
of SCF 2023, in Shenzhen, China, during December 17–18, 2023.The 8 full papers presented in this volume were carefully reviewed and selected from 28 submissions. The papers cover topics in the field of sensors and other types of sensing devices, wired and wireless networks, platforms and tools, data processing/visualization/analysis and integration engines.Par Michael Funk. 2023
Künstliche Intelligenz ist zum vielschichtigen Gegenstand ethischer Debatten geworden. Ob Richtlinien fairer Digitalisierung und vertrauenswürdiger Algorithmen, Gestaltung nachhaltiger Geschäftsmodelle, informatische…
Grundbildung in Schulen oder Existenzfragen freiheitlich-demokratischer Gesellschaften – KI-Ethik steht vor komplexen Herausforderungen. Grundsätzlicher Klärungsbedarf entsteht durch die verschiedenen Zugänge, Interessen und Begrifflichkeiten, die aufeinandertreffen. Vorliegendes essential präsentiert auf zugängliche Weise wissenschaftliches Überblickswissen zur KI-Ethik. Als praktische Orientierungshilfe im komplexen Terrain dient eine thematische Topographie, einschließlich zentraler Begriffe. Zusammenhänge zwischen Industrie 5.0, Regulierung, Post- und Transhumanismus, selbstfahrenden Autos, moralischen Maschinen, nachhaltiger Digitalisierung oder dem Anthropozän werden mit Blick auf KI-Ethik systematisch sichtbar gemacht.Par Satyasai Jagannath Nanda, Rajendra Prasad Yadav, Amir H. Gandomi, Mukesh Saraswat. 2024
This book gathers outstanding papers presented at the International Conference on Data Science and Applications (ICDSA 2023), organized by Soft…
Computing Research Society (SCRS) and Malaviya National Institute of Technology Jaipur, India, from 14 to 15 July 2023. The book is divided into four volumes, and it covers theoretical and empirical developments in various areas of big data analytics, big data technologies, decision tree learning, wireless communication, wireless sensor networking, bioinformatics and systems, artificial neural networks, deep learning, genetic algorithms, data mining, fuzzy logic, optimization algorithms, image processing, computational intelligence in civil engineering, and creative computing.Par Tomi Westerlund, Jorge Peña Queralta. 2024
This volume presents the conference proceedings from FinDrones 2023. The book highlights recent drone technology developments by experts and academicians…
for applications in agriculture, forestry, and other industries. This iteration of FinDrones presents research using autonomous drones in various fields from environmental monitoring to farm robotics and from photogrammetry to search and rescue missions. Emphasis is placed on contextualizing the conference presentations and content to Finland and the unique challenges typical to the region. The work will interest academicians, entrepreneurs, and professionals involved in remote sensing applications of unmanned aerial vehicles and enthusiasts of drone technological developments.Par Rui Pedro Machado, Helder Russa. 2024
With the shift from data warehouses to data lakes, data now lands in repositories before it's been transformed, enabling engineers…
to model raw data into clean, well-defined datasets. dbt (data build tool) helps you take data further. This practical book shows data analysts, data engineers, BI developers, and data scientists how to create a true self-service transformation platform through the use of dynamic SQL.Authors Rui Machado from Monstarlab and Hélder Russa from Jumia show you how to quickly deliver new data products by focusing more on value delivery and less on architectural and engineering aspects. If you know your business well and have the technical skills to model raw data into clean, well-defined datasets, you'll learn how to design and deliver data models without any technical influence.With this book, you'll learn:What dbt is and how a dbt project is structuredHow dbt fits into the data engineering and analytics worldsHow to collaborate on building data modelsThe main tools and architectures for building useful, functional data modelsHow to fit dbt into data warehousing and laking architectureHow to build tests for data transformationsThis four-volume set constitutes the post-conference proceedings of the 9th EAI International Conference on e-Learning, e-Education, and Online Training, eLEOT…
2023, held in Yantai, China, during August 17-18, 2023.The 104 full papers presented were selected from 260 submissions. The papers reflect the evolving landscape of education in the digital age. They were organized in topical sections as follows: IT promoted teaching platforms and systems; AI based educational modes and methods; automatic educational resource processing; educational information evaluation.This four-volume set constitutes the post-conference proceedings of the 9th EAI International Conference on e-Learning, e-Education, and Online Training, eLEOT…
2023, held in Yantai, China, during August 17-18, 2023. The 104 full papers presented were selected from 260 submissions. The papers reflect the evolving landscape of education in the digital age. They were organized in topical sections as follows: IT promoted teaching platforms and systems; AI based educational modes and methods; automatic educational resource processing; educational information evaluation.Par Susan Lincke. 2024
This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the…
technology that can best protect organizational security. It provides step-by-step guidance on how to analyze business processes from a security perspective, while also introducing security concepts and techniques to develop the requirements and design for security technologies. This interdisciplinary book is intended for business and technology audiences, at student or experienced levels.Organizations must first understand the particular threats that an organization may be prone to, including different types of security attacks, social engineering, and fraud incidents, as well as addressing applicable regulation and security standards. This international edition covers Payment Card Industry Data Security Standard (PCI DSS), American security regulation, and European GDPR. Developing a risk profile helps to estimate the potential costs that an organization may be prone to, including how much should be spent on security controls.Security planning then includes designing information security, as well as network and physical security, incident response and metrics. Business continuity considers how a business may respond to the loss of IT service. Optional areas that may be applicable include data privacy, cloud security, zero trust, secure software requirements and lifecycle, governance, introductory forensics, and ethics.This book targets professionals in business, IT, security, software development or risk. This text enables computer science, information technology, or business students to implement a case study for an industry of their choosing..Par Gaobiao Xiao. 2024
This book presents a modified spherical harmonic expansion method in which the electromagnetic fields and their sources are expanded with…
the same set of spherical vector basis functions in a similar procedure. Explicit expressions for the electromagnetic fields, potentials, energies, and the related Green’s functions are derived for the spherical modes in both frequency domain and time domain. Based on the formulation, the relationships between the electromagnetic sources, the electromagnetic far fields, and the electromagnetic near fields are clearly revealed. In particular, a nonuniform transmission line model is developed for intuitively characterizing the total radiation process. The introduction of the cutoff radius and the cutoff mode degree provides a simple reference for determining the numbers of degrees of freedom of the fields associated with sources in a bounded region. Based on the theory, an efficient hybrid method for synthesizing antenna arrays with complex footprints is proposed and demonstrated with several numerical examples. Effective algorithms are also developed for reconstructing the radiating part of the current sources.This book is intended for researchers, engineers, and graduate students who are interested in studying the energy transfer in electromagnetic radiation, synthesis and measurement of antenna arrays, and applications of inverse electromagnetic source problems.Par Steve Horowitz, Scott R. Looney. 2024
The nature of game music charges the modern-day composer with understanding a whole host of aesthetic and technical principles unique…
to the medium. Based on years of working in the field, as well as teaching the subject at colleges and universities, The Theory and Practice of Writing Music for Games is an invaluable resource for those looking for a classroom tested, directed course of study. As players and composers, themselves, authors Steve Horowitz and Scott R. Looney share the inspiration and joy of game music with an emphasis on critical thinking and the creative process, exploring the parallels and distinctions to concert music, film, TV, cartoons, and other popular forms. Each chapter builds on the next and guides the reader step by step through the essentials. Along with all the theory, a multitude of clearly defined hands-on projects and exercises are included, designed to prepare the reader to go out into the field with a complete understanding of the art and craft of music composition for games and visual media. Key Features:• Discusses a variety of topics in a simple and easy-to-understand format.• Provides a valuable resource for teachers and students, anyone who is looking to build a career in music for games.• Breaks down the fundamentals needed to build your career.• Includes fun and practical exercises that strengthen your composer chops.Par Qingshan Liu, Hanzi Wang, Zhanyu Ma, Weishi Zheng, Hongbin Zha, Xilin Chen, Liang Wang, Rongrong Ji. 2024
The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision,…
PRCV 2023, held in Xiamen, China, during October 13–15, 2023. The 532 full papers presented in these volumes were selected from 1420 submissions. The papers have been organized in the following topical sections: Action Recognition, Multi-Modal Information Processing, 3D Vision and Reconstruction, Character Recognition, Fundamental Theory of Computer Vision, Machine Learning, Vision Problems in Robotics, Autonomous Driving, Pattern Classification and Cluster Analysis, Performance Evaluation and Benchmarks, Remote Sensing Image Interpretation, Biometric Recognition, Face Recognition and Pose Recognition, Structural Pattern Recognition, Computational Photography, Sensing and Display Technology, Video Analysis and Understanding, Vision Applications and Systems, Document Analysis and Recognition, Feature Extraction and Feature Selection, Multimedia Analysis and Reasoning, Optimization and Learning methods, Neural Network and Deep Learning, Low-Level Vision and Image Processing, Object Detection, Tracking and Identification, Medical Image Processing and Analysis.Par Qingshan Liu, Hanzi Wang, Zhanyu Ma, Weishi Zheng, Hongbin Zha, Xilin Chen, Liang Wang, Rongrong Ji. 2024
The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision,…
PRCV 2023, held in Xiamen, China, during October 13–15, 2023. The 532 full papers presented in these volumes were selected from 1420 submissions. The papers have been organized in the following topical sections: Action Recognition, Multi-Modal Information Processing, 3D Vision and Reconstruction, Character Recognition, Fundamental Theory of Computer Vision, Machine Learning, Vision Problems in Robotics, Autonomous Driving, Pattern Classification and Cluster Analysis, Performance Evaluation and Benchmarks, Remote Sensing Image Interpretation, Biometric Recognition, Face Recognition and Pose Recognition, Structural Pattern Recognition, Computational Photography, Sensing and Display Technology, Video Analysis and Understanding, Vision Applications and Systems, Document Analysis and Recognition, Feature Extraction and Feature Selection, Multimedia Analysis and Reasoning, Optimization and Learning methods, Neural Network and Deep Learning, Low-Level Vision and Image Processing, Object Detection, Tracking and Identification, Medical Image Processing and Analysis.Par Qingshan Liu, Hanzi Wang, Zhanyu Ma, Weishi Zheng, Hongbin Zha, Xilin Chen, Liang Wang, Rongrong Ji. 2024
The 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision,…
PRCV 2023, held in Xiamen, China, during October 13–15, 2023. The 532 full papers presented in these volumes were selected from 1420 submissions. The papers have been organized in the following topical sections: Action Recognition, Multi-Modal Information Processing, 3D Vision and Reconstruction, Character Recognition, Fundamental Theory of Computer Vision, Machine Learning, Vision Problems in Robotics, Autonomous Driving, Pattern Classification and Cluster Analysis, Performance Evaluation and Benchmarks, Remote Sensing Image Interpretation, Biometric Recognition, Face Recognition and Pose Recognition, Structural Pattern Recognition, Computational Photography, Sensing and Display Technology, Video Analysis and Understanding, Vision Applications and Systems, Document Analysis and Recognition, Feature Extraction and Feature Selection, Multimedia Analysis and Reasoning, Optimization and Learning methods, Neural Network and Deep Learning, Low-Level Vision and Image Processing, Object Detection, Tracking and Identification, Medical Image Processing and Analysis.Par Pandian Vasant, Mohammad Shamsul Arefin, Vladimir Panchenko, J. Joshua Thomas, Elias Munapo, Gerhard-Wilhelm Weber, Roman Rodriguez-Aguilar. 2023
This book of Springer Nature is another proof of Springer’s outstanding greatness on the lively interface of Holistic Computational Optimization,…
Green IoTs, Smart Modeling, and Deep Learning! It is a masterpiece of what our community of academics and experts can provide when an interconnected approach of joint, mutual, and meta-learning is supported by advanced operational research and experience of the World-Leader Springer Nature! The 6th edition of International Conference on Intelligent Computing and Optimization took place at G Hua Hin Resort & Mall on April 27–28, 2023, with tremendous support from the global research scholars across the planet. Objective is to celebrate “Research Novelty with Compassion and Wisdom” with researchers, scholars, experts, and investigators in Intelligent Computing and Optimization across the globe, to share knowledge, experience, and innovation—a marvelous opportunity for discourse and mutuality by novel research, invention, and creativity. This proceedings book of the 6th ICO’2023 is published by Springer Nature—Quality Label of Enlightenment.Par Nicoletta Fornara, Jithin Cheriyan, Asimina Mertzani. 2023
This book constitutes the refereed proceedings of the 27th International Workshop on Coordination, Organizations, Institutions, Norms, and Ethics for Governance of…
Multi-Agent Systems, COINE 2023, held in London, UK, on May 29, 2023 (co-located with 22nd International Conference on Autonomous Agents and Multi-Agent Systems (AAMAS)).This book contains 10 full papers which are the extended and revised versions of the papers accepted to the workshop.The papers were carefully reviewed and selected from 13 submissions. They are organized in topical sections as follows: Norms, Social contracts, Institutions, and Privacy; Studies on the notion of Value; and Argumentation and Conventions