Vi bøger
Levering: 1 - 2 hverdage

Computational Intelligence and Security - Yue Hao - Bog

- International Conference, Cis 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II

af Yue Hao
Bag om Computational Intelligence and Security

The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.

Vis mere
  • Sprog:
  • Engelsk
  • ISBN:
  • 9783540308195
  • Indbinding:
  • Paperback
  • Sideantal:
  • 1166
  • Udgivet:
  • 5. December 2005
  • Størrelse:
  • 152x231x61 mm.
  • Vægt:
  • 1656 g.
  • Ukendt - mangler pt..

Normalpris

Medlemspris

Prøv i 30 dage for 45 kr.
Herefter fra 79 kr./md. Ingen binding.

Beskrivelse af Computational Intelligence and Security

The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.

Brugerbedømmelser af Computational Intelligence and Security



Find lignende bøger
Bogen Computational Intelligence and Security findes i følgende kategorier:

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.