LEADER 01003nam0-22003131i-450- 001 990007941000403321 005 20070312112110.0 035 $a000794100 035 $aFED01000794100 035 $a(Aleph)000794100FED01 035 $a000794100 100 $a20041103d1969----km-y0itay50------ba 101 0 $ager 102 $aDE 105 $ay-------001yy 200 1 $aMaterialien zur Geschichte der critischen Philosophie$fK. Gottlob Hausius$gmit einem vorwort von Lutz Geldsetzer 205 $aImpr. anastaltique de l'ed.: Leipzig, 1793 210 $aDusseldorf$cStern-Verlag Janssen$d1969 215 $aCLXXII, 238 p.$d19 cm 225 1 $aInstrumenta philosophica$iSeries thesauri$v2 700 1$aHausius,$bKarl Gottlob$0220427 702 1$aGeldsetzer,$bLutz 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990007941000403321 952 $aXI C H 7$b1767$fDFD 959 $aDFD 996 $aMaterialien zur Geschichte der critischen Philosophie$9568883 997 $aUNINA LEADER 07083nam 22008655 450 001 9910484439003321 005 20251226195344.0 010 $a3-540-30502-5 024 7 $a10.1007/b103476 035 $a(CKB)1000000000212638 035 $a(SSID)ssj0000098340 035 $a(PQKBManifestationID)11137759 035 $a(PQKBTitleCode)TC0000098340 035 $a(PQKBWorkID)10132462 035 $a(PQKB)10564513 035 $a(DE-He213)978-3-540-30502-6 035 $a(MiAaPQ)EBC3068418 035 $a(PPN)13412362X 035 $a(BIP)11352157 035 $a(EXLCZ)991000000000212638 100 $a20110111d2005 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Computer Science - ASIAN 2004, Higher Level Decision Making $e9th Asian Computing Science Conference. Dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday, Chiang Mai, Thailand, December 8-10, 2004 /$fedited by Michael J. Maher 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (XII, 510 p.) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v3321 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-24087-X 320 $aIncludes bibliographical references and index. 327 $aKeynote Papers -- Counting by Coin Tossings -- On the Role Definitions in and Beyond Cryptography -- Meme Media for the Knowledge Federation Over the Web and Pervasive Computing Environments -- Contributed Papers -- Probabilistic Space Partitioning in Constraint Logic Programming -- Chi-Square Matrix: An Approach for Building-Block Identification -- Design Exploration Framework Under Impreciseness Based on Register-Constrained Inclusion Scheduling -- Hiord: A Type-Free Higher-Order Logic Programming Language with Predicate Abstraction -- Assessment Aggregation in the Evidential Reasoning Approach to MADM Under Uncertainty: Orthogonal Versus Weighted Sum -- Learnability of Simply-Moded Logic Programs from Entailment -- A Temporalised Belief Logic for Specifying the Dynamics of Trust for Multi-agent Systems -- Using Optimal Golomb Rulers for Minimizing Collisions in Closed Hashing -- Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption -- Deniable Partial Proxy Signatures -- Formal Concept Mining: A Statistic-Based Approach for Pertinent Concept Lattice Construction -- A Robust Approach to Content-Based Musical Genre Classification and Retrieval Using Multi-feature Clustering -- Registration of 3D Range Images Using Particle Swarm Optimization -- Zero-Clairvoyant Scheduling with Inter-period Constraints -- A Novel Texture Synthesis Based Algorithm for Object Removal in Photographs -- Highly Efficient and Effective Techniques for Thai Syllable Speech Recognition -- Robot Visual Servoing Based on Total Jacobian -- Invited Papers -- Online Stochastic and Robust Optimization -- Optimal Constraint Decomposition for Distributed Databases -- Adaptive Random Testing -- Minimal Unsatisfiable Sets: Classification and Bounds -- LPOD Answer Sets and Nash Equilibria -- GraphTheoretic Models for Reasoning About Time -- Rule-Based Programming and Proving: The ELAN Experience Outcomes -- Towards Flexible Graphical Communication Using Adaptive Diagrams -- A Framework for Compiler Driven Design Space Exploration for Embedded System Customization -- Spectral-Based Document Retrieval -- Metadata Inference for Document Retrieval in a Distributed Repository -- A Simple Theory of Expressions, Judgments and Derivations -- Reactive Framework for Resource Aware Distributed Computing -- The Feature Selection and Intrusion Detection Problems -- On the BDD of a Random Boolean Function -- Concurrent Constraint-Based Memory Machines: A Framework for Java Memory Models (Summary). 330 $aThe9thAsianComputingScienceConferencewasheldinChiangMaiinDec- ber 2004. This volume contains papers that were presented at that conference. The conference was dedicated to Jean-Louis Lassez, on the occasion of his ?fth cycle (60th year) birthday. Its theme was "higher-level decision-making". Philippe Flajolet was invited to give the opening keynote address, while Yuzuru Tanaka and Phillip Rogaway were also keynote speakers. In addition to the keynote speakers, distinguished colleagues of Jean-Louis Lassez were - vited to present talks in his honour. Many of those talks are represented by papers in this volume, but I would like to thank all those speakers: Jonathan Bernick Alex Brodsky Vijay Chandru T. Y. Chen Norman Foo Martin Golumbic Richard Helm Claude Kirchner H´ el` ene Kirchner Kim Marriott Krishna Palem Kotagiri Ramamohanarao Vijay Saraswat Masahiko Sato R. K. Shyamasundar Nicolas Spyratos Andrew Sung Pascal Van Hentenryck Jean Vuillemin Following a call for papers, 75 papers were submitted, comprising 47 from Asia, 13 from Europe, 8 from Australia, 5 from North America, and 2 from the Middle East. Submissions came from a total of 23 countries. Korea, China and Thailand were the most-represented countries. These papers underwent ano- mous refereeing before the Program Committee selected 17 papers for presen- tion at the conference. I thank the Program Committee for doing an excellent job under severe time pressure. I thank the General Chairs of the conference, Joxan Ja'ar and Kanchana Kanchanasut, for their support. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v3321 606 $aComputer science 606 $aArtificial intelligence 606 $aSoftware engineering 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aApplication software 606 $aTheory of Computation 606 $aArtificial Intelligence 606 $aSoftware Engineering 606 $aCryptology 606 $aDiscrete Mathematics in Computer Science 606 $aComputer and Information Systems Applications 615 0$aComputer science. 615 0$aArtificial intelligence. 615 0$aSoftware engineering. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 0$aApplication software. 615 14$aTheory of Computation. 615 24$aArtificial Intelligence. 615 24$aSoftware Engineering. 615 24$aCryptology. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer and Information Systems Applications. 676 $a004.0151 701 $aMaher$b Michael J$0115363 701 $aLassez$b Jean-Louis$01754281 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484439003321 996 $aAdvances in Computer Science - ASIAN 2004, Higher Level Decision Making$94520481 997 $aUNINA