Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II

Author:   Yue Hao ,  Jiming Liu ,  Yuping Wang ,  Yiu-ming Cheung
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2005 ed.
Volume:   3802
ISBN:  

9783540308195


Pages:   1166
Publication Date:   05 December 2005
Format:   Paperback
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Our Price $366.96 Quantity:  
Add to Cart

Share |

Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II


Add your own review!

Overview

The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.

Full Product Details

Author:   Yue Hao ,  Jiming Liu ,  Yuping Wang ,  Yiu-ming Cheung
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2005 ed.
Volume:   3802
Dimensions:   Width: 15.50cm , Height: 6.10cm , Length: 23.50cm
Weight:   1.656kg
ISBN:  

9783540308195


ISBN 10:   3540308199
Pages:   1166
Publication Date:   05 December 2005
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Table of Contents

Cryptography and Coding.- Cryptographic Protocols.- Intrusion Detection.- Security Models and Architecture.- Security Management.- Watermarking and Information Hiding.- Web and Network Applications.- Image and Signal Processing.- Applications.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List