LEADER 03179nam 2200661 450 001 9910825194403321 005 20230725054713.0 035 $a(CKB)3710000000096388 035 $a(EBL)3115105 035 $a(SSID)ssj0001256085 035 $a(PQKBManifestationID)11749402 035 $a(PQKBTitleCode)TC0001256085 035 $a(PQKBWorkID)11258647 035 $a(PQKB)11009121 035 $a(MiAaPQ)EBC3115105 035 $a(Au-PeEL)EBL3115105 035 $a(CaPaEBR)ebr10855204 035 $a(OCoLC)878119439 035 $a(EXLCZ)993710000000096388 100 $a20140415h20112011 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aA-Life for music $emusic and computer models of living systems /$fEduardo Reck Miranda, editor 210 1$aMiddleton, Wisconsin :$cA-R Editions,$d2011. 210 4$dİ2011 215 $a1 online resource (332 p.) 225 1 $aComputer Music and Digital Audio Series ;$vVolume 24 300 $aDescription based upon print version of record. 311 $a0-89579-673-2 320 $aIncludes bibliographical references and index. 327 $a""A-Life for Music: Music and Computer Models of Living Systems""; ""A-LIFE FOR MUSIC""; ""Contents""; ""List of Figures, Examples, and Tables""; ""Preface""; ""ONE Artificial Anuran Choruses""; ""TWO Multi-Agent Modeling of Complex Rhythmic Interactions in Real- Time Performance""; ""THREE Using Coevolution in Music Improvisation""; ""FOUR Structural Coupling in a Society of Musical Agents""; ""FIVE Transformation and Mapping of L-Systems Data in the Composition of a Large- Scale Piece of Music""; ""SIX Generative Composition with Nodal"" 327 $a""SEVEN Evolutionary Morphing for Music Composition""""EIGHT The Evolving Drum Machine""; ""NINE Autonomous Evolution of Piano Pieces and Performances with Ossia II""; ""TEN A Biophysically Constrained Multi-Agent Systems Approach to Algorithmic Composition with Expressive Performance""; ""ELEVEN Artificial Evolution of Tuning Systems""; ""TWELVE Replication, Parataxis, and Evolution: Meme Journeys through the First Movement of a Mozart Sonata""; ""THIRTEEN An Ontomemetic Approach to Musical Intelligence""; ""Appendix I: Complementary Bibliography""; ""Appendix II: The Authors""; ""Index"" 410 0$aComputer music and digital audio series ;$vVolume 24. 606 $aComputer composition 606 $aGenetic algorithms 606 $aMultiagent systems 606 $aEvolutionary computation 606 $aArtificial life$xComputer programs 606 $aMusic$xComputer programs 615 0$aComputer composition. 615 0$aGenetic algorithms. 615 0$aMultiagent systems. 615 0$aEvolutionary computation. 615 0$aArtificial life$xComputer programs. 615 0$aMusic$xComputer programs. 676 $a781.3/4 702 $aMiranda$b Eduardo Reck$f1963- 702 $aMirando$b Eduardo Reck 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910825194403321 996 $aA-Life for music$94121346 997 $aUNINA LEADER 05004nam 22008175 450 001 9910349306203321 005 20250426005450.0 010 $a3-030-29729-2 024 7 $a10.1007/978-3-030-29729-9 035 $a(CKB)4100000008959012 035 $a(DE-He213)978-3-030-29729-9 035 $a(MiAaPQ)EBC5927586 035 $a(PPN)254819265 035 $a(EXLCZ)994100000008959012 100 $a20190813d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Cryptography and Network Security Workshops $eACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5?7, 2019, Proceedings /$fedited by Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XIV, 193 p. 41 illus., 28 illus. in color.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v11605 311 08$a3-030-29728-4 327 $aSiMLA - Security in Machine Learning and its Applications -- Risk-based Static Authentication in Web Applications with Behavioral Biometrics and Session Context Analytics -- Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks -- Cloud S&P - Cloud Security and Privacy -- Graphene: A Secure Cloud Communication Architecture -- A Survey on Machine Learning applications for Software Defined Network Security -- AIBlock - Application Intelligence and Blockchain Security -- A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations -- BSIEM-IoT: A Blockchain-based and Distributed SIEM for the Internet of Things -- Towards Blockchained Challenge-based Collaborative Intrusion Detection -- AIoTS - Artificial Intelligence and Industrial Internet-of-Things Security -- Enhancement to the Privacy-aware Authentication for Wi-Fi based Indoor Positioning Systems -- Design of a FDIA Resilient Protection Scheme for Power Networks by Securing Minimal Sensor Set -- Strong Leakage Resilient Encryption by Hiding Partial Ciphertext. 330 $aThis book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019. The 10 papers presented in this volume were carefully reviewed and selected from 30 submissions. They stem from the following workshops: AIBlock 2019: First International Workshop on Application Intelligence and Blockchain Security AIoTS 2019: First International Workshop on Articial Intelligence and Industrial Internet-of-Things Security Cloud S&P 2019: First International Workshop on Cloud Security and Privacy PriDA 2019: First InternationalWorkshop on Privacy-preserving Distributed Data Analysis SiMLA 2019: First International Workshop on Security in Machine Learning and its Applications. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v11605 606 $aData protection 606 $aComputer networks 606 $aComputer networks$xSecurity measures 606 $aCryptography 606 $aData encryption (Computer science) 606 $aMachine learning 606 $aApplication software 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aMobile and Network Security 606 $aCryptology 606 $aMachine Learning 606 $aComputer and Information Systems Applications 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputer networks$xSecurity measures. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aMachine learning. 615 0$aApplication software. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aMobile and Network Security. 615 24$aCryptology. 615 24$aMachine Learning. 615 24$aComputer and Information Systems Applications. 676 $a005.82 676 $a005.82 702 $aZhou$b Jianying$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDeng$b Robert$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Zhou$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMajumdar$b Suryadipta$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMeng$b Weizhi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Lingyu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhang$b Kehuan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349306203321 996 $aApplied cryptography and network security workshops$92278657 997 $aUNINA