|
![]() |
|||
|
||||
OverviewArtificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments. -Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems. -Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects). Full Product DetailsAuthor: Jerzy Soldek , Leszek DrobiazgiewiczPublisher: Springer-Verlag New York Inc. Imprint: Springer-Verlag New York Inc. Edition: Softcover reprint of the original 1st ed. 2003 Volume: 752 Dimensions: Width: 15.50cm , Height: 1.70cm , Length: 23.50cm Weight: 0.492kg ISBN: 9781461348474ISBN 10: 1461348471 Pages: 302 Publication Date: 14 October 2012 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of Contents1 Artificial Intelligence Methods and Intelligent Agents.- From a logic map to a fuzzy expert system for the description of the Middle East destabilization.- A Fuzzy Expert System for Auction Reserve Prices.- Vessel traffic optimization using a linear model with fuzzy coefficients.- Variable Precision Rough Sets.- Application of rough sets in the presumptive diagnosis of urinary system diseases.- Neural Networks and Their Economic Applications.- Application of data with missing attributes in the probability RBF neural network learning and classification.- A method of investigating a significance of input variables in non-linear high-dimensional systems.- Evolutionary Algorithm in Problem of Avoidance Collision at Sea.- Improvement and Evaluation of Autonomous Load Distribution Method.- Idea of the National System of Education and Verification Traffic's Knowledge as a Tool of Traffic Safety Increasing.- Distribution of Resources by Means of Multi-Agent Simulation Based on Incomplete Information.- A multi-agent approach to modeling and simulation of transport on demand problem.- Practical realization of modelling an airplane for an intelligent tutoring system.- Model of Natural Language Communication System for Virtual Market of Services.- Models of Integration in Decision Support Systems.- Object Classification and Recognition using Toeplitz Matrices.- 2 Computer Security and Safety.- A Propositional Logic for Access Control Policy in Distributed Systems.- Certificate-Based Access Control Policies Description Language.- Encryption using two-dimensional cellular automata with applications.- Secure data storing in a pool of vulnerable servers.- On automatic secret generation and sharing for Karin-Greene-Hellman scheme.- The FSR-255 family of hash functions with a variablelength of hash result.- Using Backward Strategy to the Needham-Schroeder Public Key Protocol Verification.- OF-FMEA: an approach to safety analysis of object-oriented software intensive systems.- Providing for continuous risk management in distributed software projects.- About Some Application of Risk Analysis and Evaluation.- Linear Approximation of Arithmetic Sum Function.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |