Domu


Book Description

A twisted old man gifted with extrasensory powers silently holds sway over an entire block of apartments, whose occupants are puppets for him to control. But then a young girl with her own battery of psychic abilities arrives to challenge him. By the author of the manga series, "Akira"




Algorithms and Architectures for Parallel Processing


Book Description

This three-volume set LNCS 12452, 12453, and 12454 constitutes the proceedings of the 20th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2020, in New York City, NY, USA, in October 2020. The total of 142 full papers and 5 short papers included in this proceedings volumes was carefully reviewed and selected from 495 submissions. ICA3PP is covering the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated in every aspects of daily life, the power of computing system has become increasingly critical. This conference provides a forum for academics and practitioners from countries around the world to exchange ideas for improving the efficiency, performance, reliability, security and interoperability of computing systems and applications. ICA3PP 2020 focus on two broad areas of parallel and distributed computing, i.e. architectures, algorithms and networks, and systems and applications.




Cognitive Reasoning


Book Description

Dealing with uncertainty, moving from ignorance to knowledge, is the focus of cognitive processes. Understanding these processes and modelling, designing, and building artificial cognitive systems have long been challenging research problems. This book describes the theory and methodology of a new, scientifically well-founded general approach, and its realization in the form of intelligent systems applicable in disciplines ranging from social sciences, such as cognitive science and sociology, through natural sciences, such as life sciences and chemistry, to applied sciences, such as medicine, education, and engineering. The main subject developed in the book is cognitive reasoning investigated at three levels of abstraction: conceptual, formal, and realizational. The authors offer a model of a cognizing agent for the conceptual theory of cognitive reasoning, and they also present a logically well-founded formal cognitive reasoning framework to handle the various plausible reasoning methods. They conclude with an object model of a cognitive engine. The book is suitable for researchers, scientists, and graduate students working in the areas of artificial intelligence, mathematical logic, and philosophy.




Domu


Book Description

Graphic novel. Winner of Japan's Science Fiction Grand Prix prize in 1983.




Algorithms and Architectures for Parallel Processing


Book Description

It is our great pleasure to welcome you to the proceedings of the 10th annual event of the International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP). ICA3PP is recognized as the main regular event covering the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical - proaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated every aspect of daily life, the power of computing systems has become increasingly critical. Therefore, ICA3PP 2010 aimed to permit researchers and practitioners from industry to exchange inf- mation regarding advancements in the state of the art and practice of IT-driven s- vices and applications, as well as to identify emerging research topics and define the future directions of parallel processing. We received a total of 157 submissions this year, showing by both quantity and quality that ICA3PP is a premier conference on parallel processing. In the first stage, all papers submitted were screened for their relevance and general submission - quirements. These manuscripts then underwent a rigorous peer-review process with at least three reviewers per paper. In the end, 47 papers were accepted for presentation and included in the main proceedings, comprising a 30% acceptance rate.





Book Description




Recent Advances in Intrusion Detection


Book Description

On behalf of the Program Committee, it is our pleasure to present the p- ceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008), which took place in Cambridge, Massachusetts, USA on September 15–17. The symposium brought together leading researchers and practitioners from academia, government and industry to discuss intrusion detection research and practice. There were six main sessions presenting full-?edged research papers (rootkit prevention, malware detection and prevention, high performance - trusion and evasion, web application testing and evasion, alert correlation and worm detection, and anomaly detection and network tra?c analysis), a session ofpostersonemergingresearchareasandcasestudies,andtwopaneldiscussions (“Government Investments: Successes, Failures and the Future” and “Life after Antivirus - What Does the Future Hold?”). The RAID 2008 Program Committee received 80 paper submissions from all over the world. All submissions were carefully reviewed by at least three independent reviewers on the basis of space, topic, technical assessment, and overallbalance.FinalselectiontookplaceattheProgramCommitteemeetingon May 23rd in Cambridge, MA. Twenty papers were selected for presentation and publication in the conference proceedings, and four papers were recommended for resubmission as poster presentations. As a new feature this year, the symposium accepted submissions for poster presentations,whichhavebeen publishedas extendedabstracts,reportingear- stageresearch,demonstrationofapplications,orcasestudies.Thirty-nineposters were submitted for a numerical review by an independent, three-person s- committee of the Program Committee based on novelty, description, and ev- uation. The subcommittee chose to recommend the acceptance of 16 of these posters for presentation and publication.




Morphosyntactic Issues in Second Language Acquisition


Book Description

This volume presents a selection of second language acquisition studies at the level of morphosyntax. It looks at different aspects of morphosyntactic development of bilingual language learners/users such as language transfer, syntactic processing, morphology and the pragmatics of language among others. The studies report on projects carried out in different language contact contexts, ranging from: English, German, Polish, Greek and Turkish. The volume also includes those studies which show the interface between research findings and pedagogy of foreign language teaching.




A Modern Czech Grammar


Book Description

With the present textbook the author has attempted to fill a long-felt need for a simple grammar of the Czech language on the college level, with a balanced presentation in the form of readings, vocabularies, grammatical explanations, and exercises.




Information Science and Applications


Book Description

This book presents selected papers from the 10th International Conference on Information Science and Applications (ICISA 2019), held on December 16–18, 2019, in Seoul, Korea, and provides a snapshot of the latest issues regarding technical convergence and convergences of security technologies. It explores how information science is at the core of most current research as well as industrial and commercial activities. The respective chapters cover a broad range of topics, including ubiquitous computing, networks and information systems, multimedia and visualization, middleware and operating systems, security and privacy, data mining and artificial intelligence, software engineering and web technology, as well as applications and problems related to technology convergence, which are reviewed and illustrated with the aid of case studies. Researchers in academia, industry, and at institutes focusing on information science and technology will gain a deeper understanding of the current state of the art in information strategies and technologies for convergence security. ​