FEEDBACK Smiley face
Normal view MARC view ISBD view

Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making [electronic resource] :9th Asian Computing Science Conference. Dedicated to Jean-Louis Lassez on the Occasion of His 5th Birthday. Chiang Mai, Thailand, December 8-10, 2004. Proceedings /

Contributor(s): Maher, Michael J [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 3321Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.Description: XII, 510 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540305026.Subject(s): Computer science | Software engineering | Data encryption (Computer science) | Computers | Computer science -- Mathematics | Artificial intelligence | Computer Science | Theory of Computation | Artificial Intelligence (incl. Robotics) | Software Engineering/Programming and Operating Systems | Data Encryption | Discrete Mathematics in Computer Science | Information Systems Applications (incl. Internet)Online resources: Click here to access online
Contents:
Keynote Papers -- Counting by Coin Tossings -- On the Role Definitions in and Beyond Cryptography -- Meme Media for the Knowledge Federation Over the Web and Pervasive Computing Environments -- Contributed Papers -- Probabilistic Space Partitioning in Constraint Logic Programming -- Chi-Square Matrix: An Approach for Building-Block Identification -- Design Exploration Framework Under Impreciseness Based on Register-Constrained Inclusion Scheduling -- Hiord: A Type-Free Higher-Order Logic Programming Language with Predicate Abstraction -- Assessment Aggregation in the Evidential Reasoning Approach to MADM Under Uncertainty: Orthogonal Versus Weighted Sum -- Learnability of Simply-Moded Logic Programs from Entailment -- A Temporalised Belief Logic for Specifying the Dynamics of Trust for Multi-agent Systems -- Using Optimal Golomb Rulers for Minimizing Collisions in Closed Hashing -- Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption -- Deniable Partial Proxy Signatures -- Formal Concept Mining: A Statistic-Based Approach for Pertinent Concept Lattice Construction -- A Robust Approach to Content-Based Musical Genre Classification and Retrieval Using Multi-feature Clustering -- Registration of 3D Range Images Using Particle Swarm Optimization -- Zero-Clairvoyant Scheduling with Inter-period Constraints -- A Novel Texture Synthesis Based Algorithm for Object Removal in Photographs -- Highly Efficient and Effective Techniques for Thai Syllable Speech Recognition -- Robot Visual Servoing Based on Total Jacobian -- Invited Papers -- Online Stochastic and Robust Optimization -- Optimal Constraint Decomposition for Distributed Databases -- Adaptive Random Testing -- Minimal Unsatisfiable Sets: Classification and Bounds -- LPOD Answer Sets and Nash Equilibria -- Graph Theoretic Models for Reasoning About Time -- Rule-Based Programming and Proving: The ELAN Experience Outcomes -- Towards Flexible Graphical Communication Using Adaptive Diagrams -- A Framework for Compiler Driven Design Space Exploration for Embedded System Customization -- Spectral-Based Document Retrieval -- Metadata Inference for Document Retrieval in a Distributed Repository -- A Simple Theory of Expressions, Judgments and Derivations -- Reactive Framework for Resource Aware Distributed Computing -- The Feature Selection and Intrusion Detection Problems -- On the BDD of a Random Boolean Function -- Concurrent Constraint-Based Memory Machines: A Framework for Java Memory Models (Summary).
In: Springer eBooks
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

Keynote Papers -- Counting by Coin Tossings -- On the Role Definitions in and Beyond Cryptography -- Meme Media for the Knowledge Federation Over the Web and Pervasive Computing Environments -- Contributed Papers -- Probabilistic Space Partitioning in Constraint Logic Programming -- Chi-Square Matrix: An Approach for Building-Block Identification -- Design Exploration Framework Under Impreciseness Based on Register-Constrained Inclusion Scheduling -- Hiord: A Type-Free Higher-Order Logic Programming Language with Predicate Abstraction -- Assessment Aggregation in the Evidential Reasoning Approach to MADM Under Uncertainty: Orthogonal Versus Weighted Sum -- Learnability of Simply-Moded Logic Programs from Entailment -- A Temporalised Belief Logic for Specifying the Dynamics of Trust for Multi-agent Systems -- Using Optimal Golomb Rulers for Minimizing Collisions in Closed Hashing -- Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption -- Deniable Partial Proxy Signatures -- Formal Concept Mining: A Statistic-Based Approach for Pertinent Concept Lattice Construction -- A Robust Approach to Content-Based Musical Genre Classification and Retrieval Using Multi-feature Clustering -- Registration of 3D Range Images Using Particle Swarm Optimization -- Zero-Clairvoyant Scheduling with Inter-period Constraints -- A Novel Texture Synthesis Based Algorithm for Object Removal in Photographs -- Highly Efficient and Effective Techniques for Thai Syllable Speech Recognition -- Robot Visual Servoing Based on Total Jacobian -- Invited Papers -- Online Stochastic and Robust Optimization -- Optimal Constraint Decomposition for Distributed Databases -- Adaptive Random Testing -- Minimal Unsatisfiable Sets: Classification and Bounds -- LPOD Answer Sets and Nash Equilibria -- Graph Theoretic Models for Reasoning About Time -- Rule-Based Programming and Proving: The ELAN Experience Outcomes -- Towards Flexible Graphical Communication Using Adaptive Diagrams -- A Framework for Compiler Driven Design Space Exploration for Embedded System Customization -- Spectral-Based Document Retrieval -- Metadata Inference for Document Retrieval in a Distributed Repository -- A Simple Theory of Expressions, Judgments and Derivations -- Reactive Framework for Resource Aware Distributed Computing -- The Feature Selection and Intrusion Detection Problems -- On the BDD of a Random Boolean Function -- Concurrent Constraint-Based Memory Machines: A Framework for Java Memory Models (Summary).

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in