Advanced Computer Systems: Eighth International Conference, ACS' 2001 Mielno, Poland October 17-19, 2001 Proceedings

Overview

Advanced Computer Systems is a collection of forty selected papers presented to the Eighth International Conference on Computer Systems, October 2001 in Mielno, Poland. These papers provide a comprehensive summary of practice and research progress in information technologies:


• Recognition, Security and Safety concentrates on the ...

See more details below
Paperback (Softcover reprint of the original 1st ed. 2002)
$209.00
BN.com price
Other sellers (Paperback)
  • All (5) from $154.15   
  • New (4) from $154.15   
  • Used (1) from $262.80   
Sending request ...

Overview

Advanced Computer Systems is a collection of forty selected papers presented to the Eighth International Conference on Computer Systems, October 2001 in Mielno, Poland. These papers provide a comprehensive summary of practice and research progress in information technologies:


• Recognition, Security and Safety concentrates on the widely-known problems of information systems security.
• Methods of Artificial Intelligence presents methods and algorithms which are the basics for the applications of artificial intelligence environments.
• Intelligent Agents and Distributed Activities includes laboratory research on multiagent intelligent systems as well as upon their applications in searching information, negotiating and supporting decision.
• Distributed Productions Networks and Modeling Complex Systems present production processes in distributed shared virtual environment, virtual solution of integer optimization problems, and a queuing approach to performance optimization in the distributed production network.

Read More Show Less

Product Details

Table of Contents

Preface
Fuzzy Expert Systems: Economic and Financial Applications 3
Backprojection of data vectors using a given covariance matrix 27
Peculiarities of Genetic Algorithm Usage When Synthesizing Neural and Fuzzy Regulators 39
Application of the Probabilistic RBF Neural Network in Multidimensional Classification Problems 49
Visual Solution of Integer Optimization Problems 59
Two methods of robust estimation of a covariance matrix - a practice study for some liver data 73
Visualisation of multivariate data using parallel coordinate plots and Kohonen's SOM's. Which is better? 89
Application of semantic analysis of Polish speech for purpose of automatic gender identification 99
Agent Based Freight Distribution System 109
Improvement of The User Interface for Autonomous Load Distributing Algorithm 121
The ROLCoDE framework used in a computational distributed calculation 131
Some Tasks of Intelligent Tutoring Systems Design for Civil Aviation Pilots 139
Presence Production in a Distributed Shared Virtual Environment for Exploring Mathematics 149
Basic workflow model at distributed intelligent production and its verification 161
MEME: An Adaptive Email-based Knowledge Sharing System for Educational Institutions 171
Models and Methods of Optimal Planning of Sales Volume for Manufacture With Probability Character of Technological Process 183
Approximation-Decomposition Method for Modelling Thermal Systems 197
An analysis of performance of CAN (Controller Area Network) Fieldbus 207
Effective Methods of Temporal Data Representation in Data Warehouse Systems 221
Outsourcing it and Virtualization in E-Business Solutions (Selected Issues) 235
Algorithmic Models for Supervectoring Calculation in Solving Base DSP Problems 251
Perception-Driven Global Illumination and Rendering Computation 267
Real-Time Shadow Casting in Virtual Studio 289
JaTrac - an exercise in designing educational raytracer 303
A Few Approaches To Face Detection In Face Recognition Systems 313
Software support for collaborative risk management 325
New Experimental Results in Differential - Linear Cryptanalysis of Reduced Variants of DES 335
A Complete Logic of Authentication 349
Generating Bent Functions 361
Multilevel Lattice-Based Authorization in Distributed Supervisory and Control Systems 371
Specification of timed authentication protocols with colored Petri nets 383
A Combinatorial Algorithm for Sharing a Key 393
Distributed Password 407
Utilizing High-Level Information for Formal Hardware Verification 419
Tabular Techniques for MV Logic 433
A Method of Analysis of Operational Petri Nets 449
Method and Validation for VHDL Case Statement Optimization 461
Algorithms of Generation Boolean Equations for a Multiplication Operation 481
Consideration of Task's Deadline for Scheduling Method with Used Processors Limitation 489
Author Index 499
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)