Computational Intelligence and Security - Wang, Yunping / Cheung, Yiu-ming / Liu, Hailin (eds.)
112,99 €
versandkostenfrei*

inkl. MwSt.
Sofort lieferbar
Ohne Risiko: Verlängertes Rückgaberecht bis zum 10.01.2021
56 °P sammeln

    Broschiertes Buch

The refereed post-proceedings of the International Conference on Computational Intelligence and Security are presented in this volume. The 116 papers were submitted to two rounds of careful review. Papers cover bio-inspired computing, evolutionary computation, learning systems and multi-agents, cryptography, information processing and intrusion detection, systems and security, image and signal processing, and pattern recognition.…mehr

Produktbeschreibung
The refereed post-proceedings of the International Conference on Computational Intelligence and Security are presented in this volume. The 116 papers were submitted to two rounds of careful review. Papers cover bio-inspired computing, evolutionary computation, learning systems and multi-agents, cryptography, information processing and intrusion detection, systems and security, image and signal processing, and pattern recognition.
  • Produktdetails
  • Lecture Notes in Computer Science Vol.4456
  • Verlag: Springer, Berlin
  • Artikelnr. des Verlages: 12111619
  • Erscheinungstermin: 21. August 2007
  • Englisch
  • Abmessung: 235mm x 155mm x 60mm
  • Gewicht: 1691g
  • ISBN-13: 9783540743767
  • ISBN-10: 3540743766
  • Artikelnr.: 23034060
Inhaltsangabe
Nonlinear and Nonstationary Signals.- Structure-Based Rule Selection Framework for Association Rule Mining of Traffic Accident Data.- A Multi-classification Method of Temporal Data Based on Support Vector Machine.- Towards a Management Paradigm with a Constrained Benchmark for Autonomic Communications.- A Feature Selection Algorithm Based on Discernibility Matrix.- Using Hybrid Hadamard Error Correcting Output Codes for Multi-class Problem Based on Support Vector Machines.- Range Image Based Classification System Using Support Vector Machines.- Two Evolutionary Methods for Learning Bayesian Network Structures.- Fuzzy Q-Map Algorithm for Reinforcement Learning.- Spatial Data Mining with Uncertainty.- Locally Weighted LS-SVM for Fuzzy Nonlinear Regression with Fuzzy Input-Output.- Learning SVM with Varied Example Cost: A kNN Evaluating Approach.- Using Evolving Agents to Critique Subjective Music Compositions.- Multi-agent Coordination Schemas in Decentralized Production Systems.- Ontology-Based RFID System Model for Supporting Semantic Consistency in Ubiquitous Environment.- Multiagent Search Strategy for Combinatorial Optimization Problems in Ant Model.- Cryptography.- Secure and Efficient Trust Negotiation.- Hardware/Software Co-design of a Secure Ubiquitous System.- Efficient Implementation of Tate Pairing on a Mobile Phone Using Java.- ID-Based (t,n) Threshold Proxy Signcryption for Multi-agent Systems.- A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit.- Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme.- Binary Sequences with Three and Four Level Autocorrelation.- Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its Implementing.- Enhanced Security Scheme for Managing Heterogeneous Server Platforms.- A New Parallel Multiplier for Type II Optimal No