Computational Intelligence and Security International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I /

Computational Intelligence and Security International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I / [electronic resource] : edited by Yue Hao, Jiming Liu, Yuping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao. - 1st ed. 2005. - XLI, 1122 p. online resource. - Lecture Notes in Artificial Intelligence, 3801 2945-9141 ; . - Lecture Notes in Artificial Intelligence, 3801 .

Learning and Fuzzy Systems -- Evolutionary Computation -- Intelligent Agents and Systems -- Intelligent Information Retrieval -- Support Vector Machine -- Swarm Intelligence -- Data Mining -- Pattern Recognition -- Applications.

9783540315995

10.1007/11596448 doi


Cryptography.
Data encryption (Computer science).
Artificial intelligence.
Information storage and retrieval systems.
Pattern recognition systems.
Computer science.
Electronic data processing--Management.
Cryptology.
Artificial Intelligence.
Information Storage and Retrieval.
Automated Pattern Recognition.
Theory of Computation.
IT Operations.

QA268

005.824
© 2024 IIIT-Delhi, library@iiitd.ac.in