Transactions on Computational Collective Intelligence XXXV [electronic resource] / / edited by Ngoc Thanh Nguyen, Ryszard Kowalczyk, Jacek Mercik, Anna Motylska-Kuźma.. — 1st ed. 2020.. — IX, 171 p. 26 illus., 12 illus. in color. : online resource. — (Transactions on Computational Collective Intelligence,) 12330 2190-9288 ;. - Transactions on Computational Collective Intelligence, 12330 .
More security or more freedom? A comparative analysis of the equilibrium in European democratic regimes -- Trials of Characterizations of Anti-manipulation Method -- Pairwise Voting Rules in Restricted Domains: The Disappearance and Persistence of Some Monotonicity Paradoxes -- Group Decision Making Based on Constructing a Short List -- A note on equal treatment and symmetry of values -- Decision-driven Model for Building IoT Architecture in Environmental Engineering -- The equity crowdfunding and family firms – a fuzzy linguistic approach -- Some propositions of approaches for measuring indirect control power of firms and mutual connections in corporate shareholding structures -- Some Strategic Decision Problems in Networks -- An IoT Virtual eLearning Space.
Анотація: These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as performance optimization in IoT, big data, reliability, privacy, security, service selection, QoS and machine learning. This thirty-fifth issue contains 10 selected papers which present new findings and innovative methodologies as well as discuss issues and challenges in the field of collective intelligence from big data and networking paradigms while addressing security, privacy, reliability and optimality to achieve QoS to the benefit of final users.
9783662622452
10.1007/978-3-662-62245-2 doi
Artificial intelligence. Computers. Computer organization. Application software. Computer security. Artificial Intelligence. Theory of Computation. Computer Systems Organization and Communication Networks. Computer Applications. Systems and Data Security. Information Systems Applications (incl. Internet).