Artificial Intelligence and Security in Computing Systems: 9th International Conference, ACS '2002 Miedzyzdroje, Poland October 23-25, 2002 Proceedings / Edition 1

Artificial Intelligence and Security in Computing Systems: 9th International Conference, ACS '2002 Miedzyzdroje, Poland October 23-25, 2002 Proceedings / Edition 1

ISBN-10:
1402073968
ISBN-13:
9781402073960
Pub. Date:
10/31/2003
Publisher:
Springer US
ISBN-10:
1402073968
ISBN-13:
9781402073960
Pub. Date:
10/31/2003
Publisher:
Springer US
Artificial Intelligence and Security in Computing Systems: 9th International Conference, ACS '2002 Miedzyzdroje, Poland October 23-25, 2002 Proceedings / Edition 1

Artificial Intelligence and Security in Computing Systems: 9th International Conference, ACS '2002 Miedzyzdroje, Poland October 23-25, 2002 Proceedings / Edition 1

Hardcover

$169.99
Current price is , Original price is $169.99. You
$169.99 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies:

-Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments.

-Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems.

-Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects).


Product Details

ISBN-13: 9781402073960
Publisher: Springer US
Publication date: 10/31/2003
Series: The Springer International Series in Engineering and Computer Science , #752
Edition description: 2003
Pages: 302
Product dimensions: 6.10(w) x 9.25(h) x 0.03(d)

Table of Contents

1 Artificial Intelligence Methods and Intelligent Agents.- From a logic map to a fuzzy expert system for the description of the Middle East destabilization.- A Fuzzy Expert System for Auction Reserve Prices.- Vessel traffic optimization using a linear model with fuzzy coefficients.- Variable Precision Rough Sets.- Application of rough sets in the presumptive diagnosis of urinary system diseases.- Neural Networks and Their Economic Applications.- Application of data with missing attributes in the probability RBF neural network learning and classification.- A method of investigating a significance of input variables in non-linear high-dimensional systems.- Evolutionary Algorithm in Problem of Avoidance Collision at Sea.- Improvement and Evaluation of Autonomous Load Distribution Method.- Idea of the National System of Education and Verification Traffic's Knowledge as a Tool of Traffic Safety Increasing.- Distribution of Resources by Means of Multi-Agent Simulation Based on Incomplete Information.- A multi-agent approach to modeling and simulation of transport on demand problem.- Practical realization of modelling an airplane for an intelligent tutoring system.- Model of Natural Language Communication System for Virtual Market of Services.- Models of Integration in Decision Support Systems.- Object Classification and Recognition using Toeplitz Matrices.- 2 Computer Security and Safety.- A Propositional Logic for Access Control Policy in Distributed Systems.- Certificate-Based Access Control Policies Description Language.- Encryption using two-dimensional cellular automata with applications.- Secure data storing in a pool of vulnerable servers.- On automatic secret generation and sharing for Karin-Greene-Hellman scheme.- The FSR-255 family of hash functions with a variablelength of hash result.- Using Backward Strategy to the Needham-Schroeder Public Key Prool Verification.- OF-FMEA: an approach to safety analysis of object-oriented software intensive systems.- Providing for continuous risk management in distributed software projects.- About Some Application of Risk Analysis and Evaluation.- Linear Approximation of Arithmetic Sum Function.
From the B&N Reads Blog

Customer Reviews