Description |
1 online resource (179 pages) |
Series |
Lecture Notes in Computer Science ; 12330 |
|
Lecture notes in computer science ; 12230.
|
Contents |
Intro -- Preface -- Contents -- More Security or More Freedom? A Comparative Analysis of the Equilibrium in European Democratic Regimes -- 1 Introduction -- 2 The Research Problem: The Equilibrium Between Freedom and Security in Democratic Regimes -- 3 The Freedom-Security Trade-Off: A Theoretical Analysis -- 4 Research Design -- 4.1 Operational Concepts of Freedom and Security -- 4.2 Cases, Indicators and Indices -- 5 The Data Set -- 6 Index of Democratic Quality -- 7 Conclusions -- 7.1 The Results of an Empirical Test -- 7.2 Further Developments -- References |
|
Trials of Characterizations of Anti-manipulation Method -- 1 Introduction -- 2 Axiomatization of the Borda Count and Scoring Functions -- 3 Properties of Anti-manipulation Method -- 4 Inconsistent Methods and Their Properties -- 5 Conclusions -- A Algorithm Description -- References -- Pairwise Voting Rules in Restricted Domains: The Disappearance and Persistence of Some Monotonicity Paradoxes -- 1 Introduction -- 2 Some Virtues and Vices of Binary Rules -- 3 Condorcet vs. Participation -- 4 Profile Restrictions -- 5 Condorcet Consistency in Unrestricted Domains |
|
6 Ten Condorcet Extensions and Participation Failures in Condorcet Domain -- 7 Concluding Comments -- References -- Group Decision Making Based on Constructing a Short List -- 1 Introduction -- 2 A Model of Search with an Individual Decision Maker -- 3 Some Results -- 4 Possible Extensions of the Model to Group Decision Making -- 4.1 Procedures for Group Decision Making -- 4.2 Game Theoretic Models -- 5 A Model of Group Decision Making Using the Short List Heuristic -- 6 Desirable Properties of Short Lists -- 7 Description of the Simulations -- 8 Results from the Simulations |
|
8.1 Search by a Single Decision Maker -- 8.2 Effect of the Structure of Correlations Between the Signals -- 8.3 Effect of the Form of the Assessment Function -- 8.4 Effect of the Relative Importance of the Second Signal -- 9 Conclusions and Future Research -- References -- A Note on Equal Treatment and Symmetry of Values -- 1 Introduction and Prerequisites -- 2 Equal Treatment and Symmetry for Additive Values -- 3 Fairness as a Substitute for Additivity or Equal Treatment -- 4 Equal Treatment and Symmetry for Marginalistic Values -- References |
|
Decision-Driven Model for Building IoT Architecture in Environmental Engineering -- 1 Introduction -- 2 State of Art -- Existing IoT Architecture Frameworks -- 2.1 IoT-A/ARM -- 2.2 The IoT Architectural Framework -- 2.3 Microsoft Azure IoT Reference Architecture -- 2.4 The 4 Stage IoT Solution Architecture -- 3 Extended Model of IoT Architecture-Additional Level of Management Processes -- 4 Extended Model of IoT Architecture-Additional Decision-Making Layer -- 4.1 Decision-Making Layer-Decision Areas -- 4.2 Decision-Making Layer-Key Problems |
|
5 Verification -- Building a Civic Measurement Network in Gdańsk Based on the Extended Model |
Summary |
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as performance optimization in IoT, big data, reliability, privacy, security, service selection, QoS and machine learning. This thirty-fifth issue contains 10 selected papers which present new findings and innovative methodologies as well as discuss issues and challenges in the field of collective intelligence from big data and networking paradigms while addressing security, privacy, reliability and optimality to achieve QoS to the benefit of final users |
Notes |
Includes author index |
|
Print version record |
Subject |
Computational intelligence.
|
|
Artificial intelligence.
|
|
Application software.
|
|
Computer security.
|
|
artificial intelligence.
|
|
Computer science.
|
|
Computer networking & communications.
|
|
Information technology: general issues.
|
|
Computer security.
|
|
Information retrieval.
|
|
Artificial intelligence.
|
|
Computers -- Computer Science.
|
|
Computers -- Networking -- General.
|
|
Computers -- Data Processing.
|
|
Computers -- Security -- General.
|
|
Computers -- Information Technology.
|
|
Computers -- Intelligence (AI) & Semantics.
|
|
Application software
|
|
Artificial intelligence
|
|
Computational intelligence
|
|
Computer security
|
Form |
Electronic book
|
Author |
Nguyen, Ngoc Thanh (Computer scientist)
|
|
Kowalczyk, Ryszard, 1961-
|
|
Mercik, Jacek
|
|
Motylska-Kuźma, Anna.
|
ISBN |
9783662622452 |
|
3662622459 |
|