Willkommen, schön sind Sie da!
Logo Ex Libris

Computational Intelligence and Security

  • Kartonierter Einband
  • 1122 Seiten
(0) Erste Bewertung abgeben
Alle Bewertungen ansehen
The International Conference on Computational Intelligence and Security (CIS) is an annualinternationalconference that bringstoget... Weiterlesen
211.00 CHF 168.80
Sie sparen CHF 42.20
Exemplar wird für Sie besorgt.
Kein Rückgaberecht!
Bestellung & Lieferung in eine Filiale möglich


The International Conference on Computational Intelligence and Security (CIS) is an annualinternationalconference that bringstogether researchers,engineers, developers and practitioners from both academia and industry to share expe- ence and exchange and cross-fertilize ideas on all areas of computational - telligence and information security. The conference serves as a forum for the dissemination of state-of-the-art research and the development, and implem- tationsof systems,technologiesandapplicationsinthese two broad,interrelated ?elds. This year CIS 2005 was co-organized by the IEEE (Hong Kong) Com- tational Intelligence Chapter and Xidian University, and co-sponsored by Hong Kong Baptist University, National Natural Science Foundation of China, Key Laboratory of Computer Networks and Information Security of the Ministry of EducationofChina,andGuangdongUniversityofTechnology. CIS2005received in total 1802 submissions from 41 countries and regions all over the world. All of them were strictly peer reviewed by the Program Committee and experts in the ?eld. Finally, 337 high-quality papers were accepted yielding an acc- tance rate of 18. 7%. Among them, 84 papers are the extended papers and 253 are the regular papers. The conference was greatly enriched by a wide range of topics covering all areas of computational intelligence and information security. Furthermore, tutorials and workshops were held for discussions of the proposed ideas. Such practice is extremely important for the e?ective development of the two ?elds and computer science in general. Wewouldliketothanktheorganizers:theIEEE(HongKong)Computational Intelligence Chapter and Xidian University for their great contributions and - forts in this big event.

Learning and Fuzzy Systems.- Empirical Analysis of Database Privacy Using Twofold Integrals.- Intrusion Detection Alert Verification Based on Multi-level Fuzzy Comprehensive Evaluation.- Improving the Scalability of Automatic Programming.- Texture Segmentation by Unsupervised Learning and Histogram Analysis Using Boundary Tracing.- An Improved Bayesian Network Learning Algorithm Based on Dependency Analysis.- Mining Common Patterns on Graphs.- Moderated Innovations in Self-poised Ensemble Learning.- An Adaptive Framework for Solving Multiple Hard Problems Under Time Constraints.- An RLS-Based Natural Actor-Critic Algorithm for Locomotion of a Two-Linked Robot Arm.- Dynamic Clustering Using Multi-objective Evolutionary Algorithm.- Multimodal FeedForward Self-organizing Maps.- Decision Fusion Based Unsupervised Texture Image Segmentation.- Speaker Adaptation Techniques for Speech Recognition with a Speaker-Independent Phonetic Recognizer.- Fuzzy QoS Controllers in Diff-Serv Scheduler Using Genetic Algorithms.- Neural Network Based Algorithms for Diagnosis and Classification of Breast Cancer Tumor.- New Learning Algorithm for Hierarchical Structure Learning Automata Operating in P-Model Stationary Random Environment.- A TFN-Based AHP Model for Solving Group Decision-Making Problems.- A Tactics for Robot Soccer with Fuzzy Logic Mediator.- Gait Control for Biped Robot Using Fuzzy Wavelet Neural Network.- A New Approach for Regression: Visual Regression Approach.- Orthogonally Rotational Transformation for Naive Bayes Learning.- Efficient Learning Bayesian Networks Using PSO.- Improving K-Modes Algorithm Considering Frequencies of Attribute Values in Mode.- Distance Protection of Compensated Transmission Line Using Computational Intelligence.- Computational Intelligence for Network Intrusion Detection: Recent Contributions.- Evolutionary Computation.- Design of a Switching PID Controller Using Advanced Genetic Algorithm for a Nonlinear System.- Preference Bi-objective Evolutionary Algorithm for Constrained Optimization.- Self-adaptive Differential Evolution.- Steady-State Evolutionary Algorithm for Multimodal Function Global Optimization.- Finding Optimal Addition Chains Using a Genetic Algorithm Approach.- Using Reconfigurable Architecture-Based Intrinsic Incremental Evolution to Evolve a Character Classification System.- On the Relevance of Using Gene Expression Programming in Destination-Based Traffic Engineering.- Model and Convergence for the Combination of Genetic Algorithm and Ant Algorithm.- Moving Block Sequence and Organizational Evolutionary Algorithm for General Floorplanning.- Integrating the Simplified Interpolation into the Genetic Algorithm for Constrained Optimization Problems.- Using Ensemble Method to Improve the Performance of Genetic Algorithm.- Parallel Mining for Classification Rules with Ant Colony Algorithm.- A Genetic Algorithm Approach on Reverse Logistics Optimization for Product Return Distribution Network.- Multi-objective Evolutionary Design and Knowledge Discovery of Logic Circuits with an Improved Genetic Algorithm.- Robust Mobile Robot Localization Using a Evolutionary Particle Filter.- Hybrid Genetic Algorithm for Solving the Degree-Constrained Minimal Bandwidth Multicast Routing Problem.- Using Fuzzy Possibilistic Mean and Variance in Portfolio Selection Model.- A Novel Genetic Algorithm for Multi-criteria Minimum Spanning Tree Problem.- Intelligent Agents and Systems.- A Software Architecture for Multi-agent Systems.- User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home.- Meta-learning Experiences with the Mindful System.- Learning Cooperation from Classifier Systems.- Location Management Using Hierarchical Structured Agents for Distributed Databases.- On_line Measurement System of Virtual Dielectric Loss Based on Wavelets and LabVIEW and Correlation Technics.- Model Checking Temporal Logics of Knowledge and Its Application in Security Verification.- A Computational Approach for Belief Change.- Feature Selection by Fuzzy Inference and Its Application to Spam-Mail Filtering.- Design of Multiagent Framework for Cellular Networks.- Transitive Dependence Based Formation of Virtual Organizations.- An Agent Based Education Resource Purvey System.- Model of Game Agent for Auction-Based Negotiation.- An Autonomous Mobile Robot Based on Quantum Algorithm.- A MPC and Genetic Algorithm Based Approach for Multiple UAVs Cooperative Search.- Self-organization Evolution of Supply Networks: System Modeling and Simulation Based on Multi-agent.- Modeling and Analysis of Multi-agent Systems Based on ?-Calculus.- A Cooperation Mechanism in Agent-Based Autonomic Storage Systems.- A Mobile Agent Based Spam Filter System.- Hexagon-Based Q-Learning to Find a Hidden Target Object.- Intelligent Information Retrieval.- A Naive Statistics Method for Electronic Program Guide Recommendation System.- A Hybrid Text Classification System Using Sentential Frequent Itemsets.- An Approach of Information Extraction from Web Documents for Automatic Ontology Generation.- Improving Text Categorization Using the Importance of Words in Different Categories.- Image Copy Detection with Rotating Tolerance.- Interactive and Adaptive Search Context for the User with the Exploration of Personalized View Reformulation.- Integrating Collaborate and Content-Based Filtering for Personalized Information Recommendation.- Interest Region-Based Image Retrieval System Based on Graph-Cut Segmentation and Feature Vectors.- A Method for Automating the Extraction of Specialized Information from the Web.- An Incremental Updating Method for Clustering-Based High-Dimensional Data Indexing.- Support Vector Machine.- Typhoon Track Prediction by a Support Vector Machine Using Data Reduction Methods.- Forecasting Tourism Demand Using a Multifactor Support Vector Machine Model.- A Study of Modelling Non-stationary Time Series Using Support Vector Machines with Fuzzy Segmentation Information.- Support Vector Machine Based Trajectory Metamodel for Conceptual Design of Multi-stage Space Launch Vehicle.- Transductive Support Vector Machines Using Simulated Annealing.- Input Selection for Support Vector Machines Using Genetic Algorithms.- Associating kNN and SVM for Higher Classification Accuracy.- Multi-class SVMs Based on SOM Decoding Algorithm and Its Application in Pattern Recognition.- Selective Dissemination of XML Documents Using GAs and SVM.- A Smoothing Support Vector Machine Based on Exact Penalty Function.- Speech Acts Tagging System for Korean Using Support Vector Machines.- A New Support Vector Machine for Multi-class Classification.- Support Vector Classification with Nominal Attributes.- A New Smooth Support Vector Machine.- The Application of Support Vector Machine in the Potentiality Evaluation for Revegetation of Abandoned Lands from Coal Mining Activities.- Prediction of T-cell Epitopes Using Support Vector Machine and Similarity Kernel.- Radial Basis Function Support Vector Machine Based Soft-Magnetic Ring Core Inspection.- Direct Adaptive NN Control of a Class of Feedforward Systems.- Swarm Intelligence.- Performance of an Ant Colony Optimization (ACO) Algorithm on the Dynamic Load-Balanced Clustering Problem in Ad Hoc Networks.- Hybrid Particle Swarm Optimization for Flow Shop Scheduling with Stochastic Processing Time.- Particle Swarm Optimizer with C-Pg Mutation.- Algal Bloom Prediction with Particle Swarm Optimization Algorithm.- Synthesis of the Antenna Array Using a Modified Particle Swarm Optimization Algorithm.- An Ant Colony Optimization Approach to the Degree-Constrained Minimum Spanning Tree Problem.- Crowd Avoidance Strategy in Particle Swarm Algorithm.- Particle Swarm Optimization with Multiscale Searching Method.- Outcome-Space Branch and Bound Algorithm for Solving Linear Multiplicative Programming.- A Binary Ant Colony Optimization for the Unconstrained Function Optimization Problem.- Data Mining.- Mining Dynamic Association Rules in Databases.- A Novel Typical-Sample-Weighted Clustering Algorithm for Large Data Sets.- Mining Weighted Generalized Fuzzy Association Rules with Fuzzy Taxonomies.- Concept Chain Based Text Clustering.- An Efficient Range Query Under the Time Warping Distance.- Robust Scene Boundary Detection Based on Audiovisual Information.- An FP-Tree Based Approach for Mining All Strongly Correlated Item Pairs.- An Improved kNN Algorithm Fuzzy kNN.- A New Integrated Personalized Recommendation Algorithm.- An Improved EMASK Algorithm for Privacy-Preserving Frequent Pattern Mining.- CR*-Tree: An Improved R-Tree Using Cost Model.- Grid-ODF: Detecting Outliers Effectively and Efficiently in Large Multi-dimensional Databases.- Clustering XML Documents by Structure Based on Common Neighbor.- A Generalized Global Convergence Theory of Projection-Type Neural Networks for Optimization.- Hierarchical Recognition of English Calling Card by Using Multiresolution Images and Enhanced Neural Network.- An Novel Artificial Immune Systems Multi-objective Optimization Algorithm for 0/1 Knapsack Problems.- RD-Based Seeded Region Growing for Extraction of Breast Tumor in an Ultrasound Volume.- Improving Classification for Microarray Data Sets by Constructing Synthetic Data.- A Method to Locate the Position of Mobile Robot Using Extended Kalman Filter.- Simulated Annealing with Injecting Star-Alignment for Multiple Sequence Alignments.- A Noise-Insensitive Hierarchical Min-Max Octree for Visualization of Ultrasound Datasets.- A Novel Fusing Algorithm for Retinal Fundus Images.- Improving PSO-Based Multiobjective Optimization Using Competition and Immunity Clonal.- Clonal Selection Algorithm for Dynamic Multiobjective Optimization.- Key Frame Extraction Based on Evolutionary Artificial Immune Network.- Clonal Selection Algorithm with Immunologic Regulation for Function Optimization.- A Fault-Tolerant and Minimum-Energy Path-Preserving Topology Control Algorithm for Wireless Multi-hop Networks.- Computational Biomechanics and Experimental Verification of Vascular Stent.- Numerical Computing of Brain Electric Field in Electroencephalogram.- A Novel Multi-stage 3D Medical Image Segmentation: Methodology and Validation.- Medical Image Alignment by Normal Vector Information.- Global Exponential Stability of Non-autonomous Delayed Neural Networks.- A Prediction Method for Time Series Based on Wavelet Neural Networks.- Training Multi-layer Perceptrons Using MiniMin Approach.- Two Adaptive Matching Learning Algorithms for Independent Component Analysis.- Bioprocess Modeling Using Genetic Programming Based on a Double Penalty Strategy.- An Improved Gibbs Sampling Algorithm for Finding TFBS.- Pattern Recognition.- A Novel Fisher Criterion Based S t -Subspace Linear Discriminant Method for Face Recognition.- EmoEars: An Emotion Recognition System for Mandarin Speech.- User Identification Using User's Walking Pattern over the ubiFloorII.- Evolving RBF Neural Networks for Pattern Classification.- Discrimination of Patchoulis of Different Geographical Origins with Two-Dimensional IR Correlation Spectroscopy and Wavelet Transform.- Gait Recognition Using View Distance Vectors.- HMM Parameter Adaptation Using the Truncated First-Order VTS and EM Algorithm for Robust Speech Recognition.- Model Type Recognition Using De-interlacing and Block Code Generation.- R-functions Based Classification for Abnormal Software Process Detection.- A Unified Framework for Shot Boundary Detection.- Image Recognition with LPP Mixtures.- Line-Based Camera Calibration.- Shot Boundary Detection Based on SVM and TMRA.- Robust Pattern Recognition Scheme for Devanagari Script.- Credit Evaluation Model and Applications Based on Probabilistic Neural Network.- Fingerprint Ridge Line Extraction Based on Tracing and Directional Feedback.- A New Method for Human Gait Recognition Using Temporal Analysis.- Microcalcification Patterns Recognition Based Combination of Autoassociator and Classifier.- Improved Method for Gradient-Threshold Edge Detector Based on HVS.- MUSC: Multigrid Shape Codes and Their Applications to Image Retrieval.- Applications.- Adaptation of Intelligent Characters to Changes of Game Environments.- An Knowledge Model for Self-regenerative Service Activations Adaptation Across Standards.- An Agent for the HCARD Model in the Distributed Environment.- A New Class of Filled Functions for Global Minimization.- Modified PSO Algorithm for Deadlock Control in FMS.- Optimization Design of Controller Periods Using Evolution Strategy.- Application of Multi-objective Evolutionary Algorithm in Coordinated Design of PSS and SVC Controllers.


Titel: Computational Intelligence and Security
Untertitel: International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I
EAN: 9783540308188
ISBN: 978-3-540-30818-8
Format: Kartonierter Einband
Herausgeber: Springer, Berlin
Genre: Informatik
Anzahl Seiten: 1122
Gewicht: 1702g
Größe: H235mm x B235mm x T155mm
Jahr: 2005
Untertitel: Englisch
Auflage: 2005

Weitere Produkte aus der Reihe "Lecture Notes in Artificial Intelligence"