Artificial Intelligence and Security in Computing Systems : 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23-25, 2002 Proceedings (Englisch)
- Neue Suche nach: Sołdek, Jerzy
- Neue Suche nach: Sołdek, Jerzy
- Neue Suche nach: Drobiazgiewicz, Leszek
2003
-
ISBN:
- Buch / Elektronische Ressource
-
Titel:Artificial Intelligence and Security in Computing Systems : 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23-25, 2002 Proceedings
-
Beteiligte:Sołdek, Jerzy ( Autor:in ) / Drobiazgiewicz, Leszek
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Boston, MA
-
Erscheinungsdatum:2003
-
Format / Umfang:Online-Ressource (X, 302 p)
-
Anmerkungen:digital
Campusweiter Zugriff (Universität Hannover). - Vervielfältigungen (z.B. Kopien, Downloads) sind nur von einzelnen Kapiteln oder Seiten und nur zum eigenen wissenschaftlichen Gebrauch erlaubt. Keine Weitergabe an Dritte. Kein systematisches Downloaden durch Robots. -
ISBN:
-
DOI:
-
Medientyp:Buch
-
Format:Elektronische Ressource
-
Sprache:Englisch
- Neue Suche nach: 006.3
- Weitere Informationen zu Dewey Decimal Classification
-
Schlagwörter:
-
Klassifikation:
DDC: 006.3 -
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
From a logic map to a fuzzy expert system for the description of the Middle East destabilizationGisella, Facchinetti / Francesco, Franci / Giovanni, Mastroleo / Vittorio, Pagliaro / Gianni, Ricci et al. | 2003
- 13
-
A Fuzzy Expert System for Auction Reserve PricesForte, Francesco / Mantovani, Michela / Facchinetti, Gisella / Mastroleo, Giovanni et al. | 2003
- 23
-
Vessel traffic optimization using a linear model with fuzzy coefficientsUchacz, Waldemar / Pietrzykowski, Zbigniew et al. | 2003
- 33
-
Variable Precision Rough SetsMieszkowicz-Rolka, Alicja / Rolka, Leszek et al. | 2003
- 41
-
Application of rough sets in the presumptive diagnosis of urinary system diseasesCzerniak, Jacek / Zarzycki, Hubert et al. | 2003
- 53
-
Neural Networks and Their Economic ApplicationsMorajda, Janusz et al. | 2003
- 63
-
Application of data with missing attributes in the probability RBF neural network learning and classificationPluciński, Marcin et al. | 2003
- 73
-
A method of investigating a significance of input variables in non-linear high-dimensional systemsRejer, Izabela / Piegat, Andrzej et al. | 2003
- 81
-
Evolutionary Algorithm in Problem of Avoidance Collision at SeaŚmierzchalski, Roman et al. | 2003
- 91
-
Improvement and Evaluation of Autonomous Load Distribution MethodIto, Yugo / Miyazaki, Shin-ichi / Higami, Yoshinobu / Kobayashi, Shin-Ya et al. | 2003
- 101
-
Idea of the National System of Education and Verification Traffic’s Knowledge as a Tool of Traffic Safety IncreasingRóżewski, Przemysław / Wiliński, Antoni / Zaikine, Oleg / Giżycki, Krzysztof et al. | 2003
- 111
-
Distribution of Resources by Means of Multi-Agent Simulation Based on Incomplete InformationNawarecki, Edward / Dobrowolski, Grzegorz / Kisiel-Dorohinicki, Marek et al. | 2003
- 119
-
A multi-agent approach to modeling and simulation of transport on demand problemGruer, Pablo / Hilaire, Vincent / Kozlak, Jaroslaw / Koukam, Abder et al. | 2003
- 127
-
Practical realization of modelling an airplane for an intelligent tutoring systemPopov, Orest / Barcz, Anna / Piela, Piotr / Sobczak, Tomasz et al. | 2003
- 137
-
Model of Natural Language Communication System for Virtual Market of ServicesPechmann, Piotr / Sołdek, Jerzy et al. | 2003
- 153
-
Models of Integration in Decision Support SystemsŚmiałkowska, Bożena et al. | 2003
- 163
-
Object Classification and Recognition using Toeplitz MatricesSaeed, Khalid et al. | 2003
- 175
-
A Propositional Logic for Access Control Policy in Distributed SystemsKurkowski, Mirosław / Pejaś, Jerzy et al. | 2003
- 191
-
Certificate-Based Access Control Policies Description LanguagePejaś, Jerzy et al. | 2003
- 203
-
Encryption using two-dimensional cellular automata with applicationsSrebrny, Marian / Such, Piotr et al. | 2003
- 217
-
Secure data storing in a pool of vulnerable serversGogolewski, Marcin / Kutyłowski, Mirosław et al. | 2003
- 227
-
On automatic secret generation and sharing for Karin-Greene-Hellman schemeKulesza, Kamil / Kotulski, Zbigniew et al. | 2003
- 239
-
The FSR-255 family of hash functions with a variable length of hash resultGajewski, Tadeusz / Janicka-Lipska, Izabela / Stokłosa, Janusz et al. | 2003
- 249
-
Using Backward Strategy to the Needham-Schroeder Public Key Protocol VerificationKurkowski, Mirosław / Maćków, Witold et al. | 2003
- 25
-
OF-FMEA: an approach to safety analysis of object-oriented software intensive systemsCichocki, Tadeusz / Górski, Janusz et al. | 2003
- 271
-
Providing for continuous risk management in distributed software projectsGórski, Janusz / Miler, Jakub et al. | 2003
- 283
-
About Some Application of Risk Analysis and EvaluationFray, Imed et al. | 2003
- 293
-
Linear Approximation of Arithmetic Sum FunctionChmiel, Krzysztof et al. | 2003