Intelligent Systems

PUBLISHED


Viewing: 1 - 10 of 98
Published:
September 02, 2014
Author(s):
Ryszard Tadeusiewicz, Rituparna Chaki, Nabendu Chaki
The utility of artificial neural network models lies in the fact that they can be used to infer functions from observations—making them especially useful in applications where the complexity of data or tasks makes the design of such functions by hand impractical.Exploring Neural Networks with C# 
Published:
August 29, 2014
Editor(s):
Biju Issac, Nauman Israr
Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology. Filling this need, Case Studies in Intelligent Computing: Achievements and Trends provides an up-to-date 
Published:
August 29, 2014
Editor(s):
Biju Issac, Nauman Israr
In today’s age of wireless and mobile computing, network and computer security is paramount. Case Studies in Secure Computing: Achievements and Trends gathers the latest research from researchers who share their insights and best practices through illustrative case studies.This book examines the 
Published:
June 23, 2014
Editor(s):
Niranjan Suri, Giacomo Cabri
As the complexity of today’s networked computer systems grows, they become increasingly difficult to understand, predict, and control. Addressing these challenges requires new approaches to building these systems. Adaptive, Dynamic, and Resilient Systems supplies readers with various perspectives 
Published:
February 04, 2014
Editor(s):
Oscar Humberto Montiel Ross, Roberto Sepulveda
This book examines the present and future of soft computer techniques. It explains how to use the latest technological tools, such as multicore processors and graphics processing units, to implement highly efficient intelligent system methods using a general purpose computer. 
Published:
December 09, 2013
Editor(s):
Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing
Although biometric systems present powerful alternatives to traditional authentication schemes, there are still many concerns about their security. Advances in Biometrics for Secure Human Authentication and Recognition showcases some of the latest technologies and algorithms being used for human 
Published:
November 14, 2013
Author(s):
Epaminondas Kapetanios, Doina Tatar, Christian Sacarea
This book introduces the semantic aspects of natural language processing and its applications. Topics covered include: measuring word meaning similarity, multi-lingual querying, and parametric theory, named entity recognition, semantics, query language, and the nature of language. The book also 
Published:
October 25, 2013
Editor(s):
Matej Rojc, Nick Campbell
Embodied conversational agents (ECA) and speech-based human–machine interfaces can together represent more advanced and more natural human–machine interaction. Fusion of both topics is a challenging agenda in research and production spheres. The important goal of human–machine interfaces is to 
Published:
October 11, 2013
Editor(s):
Hsiang-Chuan Liu, Wen-Pei Sung, Yao Wenli
This proceedings volume brings together some 189 peer-reviewed papers presented at the International Conference on Information Technology and Computer Application Engineering, held 27-28 August 2013, in Hong Kong, China. Specific topics under consideration include Control, Robotics, and Automation, 
Published:
October 07, 2013
Editor(s):
Justyna Zander, Pieter J. Mosterman
The exponential progress and accessibility of computing has vastly increased data flows and revolutionized the practice of science, engineering, and communication. Computing plays a critical role in advancing research across almost every scientific discipline. Computation for Humanity: Information 

News and Notes

Join the Conversation!
Sign up to receive CRC Press' First Look eAlerts, special discounts and promotions!

Like us on Facebook, join our LinkedIn Group, or follow us on Twitter.

Online Bestsellers:

_____

Is Your System Safe? Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

Find Out What the Reviewers are Saying:

Slashdot

RSA Conference

_____

Find Our Books at the Bookstores of These Conferences:

RSA 2012: San Francisco, California, February 27-March 3

IBM Pulse 2012: Las Vegas, Nevada, March 4-7

T & F Journals
Did you know that you can access sample editions and free articles from the home pages of most Taylor & Francis Journals?

Information Technology for Development Published on behalf of the Commonwealth Secretariat

Information Security Journal: A Global Perspective The Official Journal of (ISC)2
Call for Papers!

Looking for a Complete Online Reference Library on Information Technology?

Our award-winning CRCnetBASE collections provide online access to full libraries of subject-specific handbooks and references:

Sign up for our industry eNewsletters! Simply click on the link below. You will be taken to a website. Sign up will be on the upper right hand side of the homepage.

IT Today

Information Security Today

IT Performance Improvement