Normal view MARC view ISBD view

Computational Intelligence and Security [electronic resource] :International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part II / edited by Yue Hao, Jiming Liu, Yu-Ping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao.

by Hao, Yue [editor.]; Liu, Jiming [editor.]; Wang, Yu-Ping [editor.]; Cheung, Yiu-ming [editor.]; Yin, Hujun [editor.]; Jiao, Licheng [editor.]; Ma, Jianfeng [editor.]; Jiao, Yong-Chang [editor.]; SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 3802Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.Description: XLII, 1166 p. Also available online. online resource.ISBN: 9783540315988.Subject(s): Computer science | Computer software | Information storage and retrieval systems | Information systems | Artificial intelligence | Information Systems | Computer Science | Artificial Intelligence (incl. Robotics) | Information Storage and Retrieval | Information Systems Applications (incl.Internet) | Computation by Abstract Devices | Algorithm Analysis and Problem Complexity | Management of Computing and Information SystemsDDC classification: 006.3 Online resources: Click here to access online
Contents:
Cryptography and Coding -- Cryptographic Protocols -- Intrusion Detection -- Security Models and Architecture -- Security Management -- Watermarking and Information Hiding -- Web and Network Applications -- Image and Signal Processing -- Applications.
In: Springer eBooksSummary: The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)

Cryptography and Coding -- Cryptographic Protocols -- Intrusion Detection -- Security Models and Architecture -- Security Management -- Watermarking and Information Hiding -- Web and Network Applications -- Image and Signal Processing -- Applications.

The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.

There are no comments for this item.

Log in to your account to post a comment.
@ Jomo Kenyatta University Of Agriculture and Technology Library

Powered by Koha