Advanced Data Mining Tools and Methods for Social Computing explores advances in the latest data mining tools, methods, algorithms and the...
Computer vision and machine intelligence paradigms are prominent in the domain of medical image applications, including computer assisted diagnosis...
In honour of Professor Erkki Oja, one of the pioneers of Independent Component Analysis (ICA), this book reviews key advances in the theory and...
Adversarial Robustness for Machine Learning summarizes the recent progress on this topic and introduces popular algorithms on adversarial attack...
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account...
Fuzzy set and logic theory suggest that all natural language linguistic expressions are imprecise and must be assessed as a matter of degree. But in...
Intelligent agents are employed as the central characters in this new introductory text. Beginning with elementary reactive agents, Nilsson gradually...
This volume contains papers in the areas of artificial intelligence, expert systems, symbolic computing and applications to scientific computing...
Intelligent agents are employed as the central characters in this introductory text. Beginning with elementary reactive agents, Nilsson gradually...
Artificial Intelligence for the Internet of Everything considers the foundations, metrics and applications of IoE systems. It covers whether devices...