Skip to content

Artificial Intelligence and Security in Computing Systems 9th International Conference, ACS '2002 Midzyzdroje, Poland October 23-25, 2002 - Proceedings

Best in textbook rentals since 2012!

ISBN-10: 1402073968

ISBN-13: 9781402073960

Edition: 2003

Authors: Jerzy Soldek, Leszek Drobiazgiewicz

List price: $169.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments. -Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems. -Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key…    
Customers also bought

Book details

List price: $169.99
Copyright year: 2003
Publisher: Springer
Publication date: 10/31/2003
Binding: Hardcover
Pages: 302
Size: 6.10" wide x 9.25" long x 1.00" tall
Weight: 3.036
Language: English

From a logic map to a fuzzy expert system for the description of the Middle East destabilization
A fuzzy expert system for auction reserve prices
Vessel traffic optimization using a linear model with fuzzy coefficients
Variable precision rough sets
Application of rough sets in the presumptive diagnosis of urinary system diseases
Neural networks and their economic applications
Application of data with missing attributes in the probability rbf neural network learning and classification
A method of investigating a significance of input variables in non-linear high-dimensional systems
Evolutionary algorithm in problem of avoidance collision at sea
Improvement and evaluation of autonomous load distribution method
Idea of the national system of education and verification traffic's knowledge as a tool of traffic safety increasing
Distribution of resources by means of multi-agent simulation based on incomplete information
A multi-agent approach to modeling and simulation of transport on demand problem
Practical realization of modelling an airplane for an intelligent tutoring system
Model of natural language communication system for virtual market of services
Models of integration in decision support systems
Object classification and recognition using toeplitz matrices
A propositional logic for access control policy in distributed systems
Certificate-based access control policies description language
Encryption using two-dimensional cellular automata with applications
Secure data storing in a pool of vulnerable servers
On automatic secret generation and sharing for Karin-Greene-Hellman scheme
The FSR-255 family of hash functions with a variable length of hash result
Using backward strategy to the Needham-Schroeder public key protocol verification
OF-FMEA : an approach to safety analysis of object-oriented software intensive systems
Providing for continuous risk management in distributed software projects
About some application of risk analysis and evaluation
Linear approximation of arithmetic sum function