Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Artificial Intelligence and Security in Computing Systems -

Artificial Intelligence and Security in Computing Systems

9th International Conference, ACS ’2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings
Buch | Hardcover
302 Seiten
2003
Springer-Verlag New York Inc.
978-1-4020-7396-0 (ISBN)
CHF 224,65 inkl. MwSt
Focuses on three areas of practice and research progress in information technologies: Methods of Artificial Intelligence; Multiagent Systems; and Computer Security and Safety. This book also focuses on cryptographic algorithms, a formal language for policy access control description and its implementation, and risk management methods.
Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies:
-Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments.
-Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems.
-Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects).

1 Artificial Intelligence Methods and Intelligent Agents.- From a logic map to a fuzzy expert system for the description of the Middle East destabilization.- A Fuzzy Expert System for Auction Reserve Prices.- Vessel traffic optimization using a linear model with fuzzy coefficients.- Variable Precision Rough Sets.- Application of rough sets in the presumptive diagnosis of urinary system diseases.- Neural Networks and Their Economic Applications.- Application of data with missing attributes in the probability RBF neural network learning and classification.- A method of investigating a significance of input variables in non-linear high-dimensional systems.- Evolutionary Algorithm in Problem of Avoidance Collision at Sea.- Improvement and Evaluation of Autonomous Load Distribution Method.- Idea of the National System of Education and Verification Traffic's Knowledge as a Tool of Traffic Safety Increasing.- Distribution of Resources by Means of Multi-Agent Simulation Based on Incomplete Information.- A multi-agent approach to modeling and simulation of transport on demand problem.- Practical realization of modelling an airplane for an intelligent tutoring system.- Model of Natural Language Communication System for Virtual Market of Services.- Models of Integration in Decision Support Systems.- Object Classification and Recognition using Toeplitz Matrices.- 2 Computer Security and Safety.- A Propositional Logic for Access Control Policy in Distributed Systems.- Certificate-Based Access Control Policies Description Language.- Encryption using two-dimensional cellular automata with applications.- Secure data storing in a pool of vulnerable servers.- On automatic secret generation and sharing for Karin-Greene-Hellman scheme.- The FSR-255 family of hash functions with a variablelength of hash result.- Using Backward Strategy to the Needham-Schroeder Public Key Protocol Verification.- OF-FMEA: an approach to safety analysis of object-oriented software intensive systems.- Providing for continuous risk management in distributed software projects.- About Some Application of Risk Analysis and Evaluation.- Linear Approximation of Arithmetic Sum Function.

Erscheint lt. Verlag 31.10.2003
Reihe/Serie The Springer International Series in Engineering and Computer Science ; 752
Zusatzinfo X, 302 p.
Verlagsort New York, NY
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Kryptologie
Informatik Theorie / Studium Künstliche Intelligenz / Robotik
ISBN-10 1-4020-7396-8 / 1402073968
ISBN-13 978-1-4020-7396-0 / 9781402073960
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich