LEADER 04072nam 22008655 450 001 996465963903316 005 20200702151359.0 010 $a3-540-31599-3 024 7 $a10.1007/11596448 035 $a(CKB)1000000000232733 035 $a(SSID)ssj0000316783 035 $a(PQKBManifestationID)11258547 035 $a(PQKBTitleCode)TC0000316783 035 $a(PQKBWorkID)10276696 035 $a(PQKB)11075916 035 $a(DE-He213)978-3-540-31599-5 035 $a(MiAaPQ)EBC3068401 035 $a(PPN)123098912 035 $a(EXLCZ)991000000000232733 100 $a20100409d2005 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputational Intelligence and Security$b[electronic resource] $eInternational Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I /$fedited by Yue Hao, Jiming Liu, Yuping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (XLI, 1122 p.) 225 1 $aLecture Notes in Artificial Intelligence ;$v3801 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-30818-0 320 $aIncludes bibliographical references and index. 327 $aLearning and Fuzzy Systems -- Evolutionary Computation -- Intelligent Agents and Systems -- Intelligent Information Retrieval -- Support Vector Machine -- Swarm Intelligence -- Data Mining -- Pattern Recognition -- Applications. 410 0$aLecture Notes in Artificial Intelligence ;$v3801 606 $aData encryption (Computer science) 606 $aArtificial intelligence 606 $aInformation storage and retrieval 606 $aPattern recognition 606 $aComputers 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aPattern Recognition$3https://scigraph.springernature.com/ontologies/product-market-codes/I2203X 606 $aComputation by Abstract Devices$3https://scigraph.springernature.com/ontologies/product-market-codes/I16013 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aArtificial intelligence. 615 0$aInformation storage and retrieval. 615 0$aPattern recognition. 615 0$aComputers. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aArtificial Intelligence. 615 24$aInformation Storage and Retrieval. 615 24$aPattern Recognition. 615 24$aComputation by Abstract Devices. 615 24$aManagement of Computing and Information Systems. 676 $a006.3 702 $aHao$b Yue$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLiu$b Jiming$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Yuping$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aCheung$b Yiu-ming$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYin$b Hujun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJiao$b Licheng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMa$b Jianfeng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJiao$b Yong-Chang$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aCIS (Conference) 906 $aBOOK 912 $a996465963903316 996 $aComputational Intelligence and Security$9771952 997 $aUNISA