Artificial Intelligence and Security in Computing Systems: 9th International Conference, ACS '2002 Miedzyzdroje, Poland October 23-25, 2002 Proceedings / Edition 1

Artificial Intelligence and Security in Computing Systems: 9th International Conference, ACS '2002 Miedzyzdroje, Poland October 23-25, 2002 Proceedings / Edition 1

by Jerzy Soldek
     
 

ISBN-10: 1402073968

ISBN-13: 9781402073960

Pub. Date: 10/31/2003

Publisher: Springer US

Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies:

-Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments.
-Multiagent Systems include

Overview

Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies:

-Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments.
-Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems.
-Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects).

Product Details

ISBN-13:
9781402073960
Publisher:
Springer US
Publication date:
10/31/2003
Series:
The Springer International Series in Engineering and Computer Science, #752
Edition description:
2003
Pages:
302
Product dimensions:
6.10(w) x 9.25(h) x 0.03(d)

Table of Contents

Preface.
1: Artificial Intelligence Methods And Intelligent Agents. From A Logic Map To A Fuzzy Expert System For The Description Of The Middle East Destabilization; F. Gisella, F. Francesco, M. Giovanni, P. Vittorio, R. Gianni. A Fuzzy Expert System For Auction Reserve Prices; F. Forte, M. Mantovani, G. Facchinetti, G. Mastroleo. Vessel Traffic Optimization Using A Linear Model With Fuzzy Coefficients; W. Uchacz, Z. Pietrzykowski. Variable Precision Rough Sets; A. Mieszkowicz-Rolka, L. Rolka. Application Of Rough Sets In The Presumptive Diagnosis Of Urinary System Diseases; J. Czerniak, H. Zarzycki. Neural Networks And Their Economic Applications; J. Morajda. Application Of Data With Missing Attributes In The Probability RBF Neural Network Learning And Classification; M. Plucinski. A Method Of Investigating A Significance Of Input Variables In Non-Linear High-Dimensional Systems; I. Rejer, A. Piegat. Evolutionary Algorithm In Problem Of Avoidance Collision At Sea; R. Smierzchalski. Improvement And Evaluation Of Autonomous Load Distribution Method; Y. Ito, S.-I. Miyazaki,Y. Higami, S.-Y. Kobayashi. Idea Of The National System Of Education And Verification Traffic's Knowledge As A Tool Of Traffic Safety Increasing; P. Rózewski, A. Wilinski, O. Zaikine, K. Gizycki. Distribution Of Resources By Means Of Multi-Agent Simulation Based On Incomplete Information; E. Nawarecki, G. Dobrowolski, M. Kisiel-Dorohinicki. A Multi-Agent Approach To Modeling And Simulation Of Transport On Demand Problem; P. Gruer, V. Hilaire, J. Kozlak, A. Koukam. Practical Realization Of Modelling An Airplane For An Intelligent Tutoring System; O. Popov, A. Barcz, P. Piela, T. Sobczak. Model Of Natural Language Communication System For Virtual Market OfServices; P. Pechmann, J. Sołdek. Models Of Integration In Decision Support Systems; B. Śmiałkowska. Object Classification And Recognition Using Toeplitz Matrices; K. Saeed.
2: Computer Security And Safety. A Propositional Logic For Access Control Policy In Distributed Systems; M. Kurkowski, J. Pejaś. Certificate-Based Access Control Policies Description Language; J. Pejaś. Encryption Using Two-Dimensional Cellular Automata With Applications; M. Srebrny, P. Such. Secure Data Storing In A Pool Of Vulnerable Servers; M. Gogolewski, M. Kutyłowski. On Automatic Secret Generation And Sharing For Karin-Greene-Hellman Scheme; K. Kulesza, Z. Kotulski. The FSR-255 Family Of Hash Functions With A Variable Length Of Hash Result; T. Gajewski, I. Janicka-Lipska, J. Stokłosa. Using Backward Strategy To The Needham-Schroeder Public Key Prool Verification; M. Kurkowski, W. Macków. OF-FMEA: An Approach To Safety Analysis Of Object-Oriented Software Intensive Systems; T. Cichocki, J. Górski. Providing For Continuous Risk Management In Distributed Software Projects; J. Górski, J. Miler. About Some Application Of Risk Analysis And Evaluation; I. El Fray. Linear Approximation Of Arithmetic Sum Function; K. Chmiel.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >