Information and communications security : 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings / / Sihan Qing, Hideki Imai, Guilin Wang (editors) |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg : , : Springer, , [2007] |
Descrizione fisica | 1 online resource (XIV, 514 p.) |
Disciplina | 005.8 |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security
Telecommunication systems - Security measures |
ISBN | 3-540-77048-8 |
Classificazione |
004
DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Authentication and Key Exchange -- Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures -- New Construction of Group Secret Handshakes Based on Pairings -- nPAKE?+?: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords -- An Efficient Password-Only Two-Server Authenticated Key Exchange System -- Digital Signatures -- Formal Definition and Construction of Nominative Signature -- Short Group Signature Without Random Oracles -- (Convertible) Undeniable Signatures Without Random Oracles -- Applications -- A New Dynamic Accumulator for Batch Updates -- Preventing Unofficial Information Propagation -- A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction -- Privacy Protection on Multiple Sensitive Attributes -- Watermarking -- Audio Watermarking Algorithm Based on Centroid and Statistical Features -- A Semi-blind Watermarking Based on Discrete Wavelet Transform -- Fast Implementations -- On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme -- High Speed Modular Divider Based on GCD Algorithm -- MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set -- Compact and Secure Design of Masked AES S-Box -- Applied Cryptography -- Boudot’s Range-Bounded Commitment Scheme Revisited -- Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions -- Secure Multiparty Computation of DNF -- Cryptanalysis -- Square Like Attack on Camellia -- Differential Fault Analysis on CLEFIA -- Extending FORK-256 Attack to the Full Hash Function -- Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard -- Formal Analysis -- A Framework for Game-Based Security Proofs -- What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security -- Modeling Agreement Problems in the Universal Composability Framework -- System Security I -- A System Architecture for History-Based Access Control for XML Documents -- Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing -- Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies -- System Security II -- A Novel Approach for Untrusted Code Execution -- Detection and Diagnosis of Control Interception -- BIOS Security Analysis and a Kind of Trusted BIOS -- Collecting Autonomous Spreading Malware Using High-Interaction Honeypots -- Network Security -- DDoS Attack Detection Algorithms Based on Entropy Computing -- Firewall for Dynamic IP Address in Mobile IPv6 -- Application of the PageRank Algorithm to Alarm Graphs -- Drive-By Pharming. |
Record Nr. | UNISA-996466253403316 |
Berlin ; ; Heidelberg : , : Springer, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information security and cryptology - icisc 2007 : 10th international conference, seoul, korea, november 29-30, 2007, proceedings / / edited by Kil-Hyun Nam, Gwangsoo Rhee |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Germany : , : Springer, , [2007] |
Descrizione fisica | 1 online resource (XIII, 370 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico | Computer security |
ISBN | 3-540-76788-6 |
Classificazione |
004
DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptanalysis – I -- Cryptanalysis of a Hash Function Proposed at ICISC 2006 -- Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 -- A Cryptanalysis of the Double-Round Quadratic Cryptosystem -- A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment -- Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments -- Handling Dynamic Information Release -- Cryptanalysis – II -- Improving the Time Complexity of Matsui’s Linear Cryptanalysis -- On Large Distributions for Linear Cryptanalysis -- Passive Attacks on a Class of Authentication Protocols for RFID -- Side Channel Attacks on Irregularly Decimated Generators -- Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module -- Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences -- A Secure Virtual Execution Environment for Untrusted Code -- Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum -- Improving Upon the TET Mode of Operation -- Hash Functions – I -- New Local Collisions for the SHA-2 Hash Family -- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL -- Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4 -- New Results on Impossible Differential Cryptanalysis of Reduced AES -- A Note About the Traceability Properties of Linear Codes -- Power Analysis Attacks on MDPL and DRSL Implementations -- Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier -- Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA -- Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon’s Algorithm -- Hash Functions – II -- Analysis of Multivariate Hash Functions -- Colliding Message Pair for 53-Step HAS-160 -- Weaknesses in the HAS-V Compression Function -- Security-Preserving Asymmetric Protocol Encapsulation. |
Record Nr. | UNINA-9910483548503321 |
Berlin, Germany : , : Springer, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information security and cryptology - icisc 2007 : 10th international conference, seoul, korea, november 29-30, 2007, proceedings / / edited by Kil-Hyun Nam, Gwangsoo Rhee |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Germany : , : Springer, , [2007] |
Descrizione fisica | 1 online resource (XIII, 370 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico | Computer security |
ISBN | 3-540-76788-6 |
Classificazione |
004
DAT 465f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptanalysis – I -- Cryptanalysis of a Hash Function Proposed at ICISC 2006 -- Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 -- A Cryptanalysis of the Double-Round Quadratic Cryptosystem -- A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment -- Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments -- Handling Dynamic Information Release -- Cryptanalysis – II -- Improving the Time Complexity of Matsui’s Linear Cryptanalysis -- On Large Distributions for Linear Cryptanalysis -- Passive Attacks on a Class of Authentication Protocols for RFID -- Side Channel Attacks on Irregularly Decimated Generators -- Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module -- Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences -- A Secure Virtual Execution Environment for Untrusted Code -- Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum -- Improving Upon the TET Mode of Operation -- Hash Functions – I -- New Local Collisions for the SHA-2 Hash Family -- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL -- Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4 -- New Results on Impossible Differential Cryptanalysis of Reduced AES -- A Note About the Traceability Properties of Linear Codes -- Power Analysis Attacks on MDPL and DRSL Implementations -- Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier -- Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA -- Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon’s Algorithm -- Hash Functions – II -- Analysis of Multivariate Hash Functions -- Colliding Message Pair for 53-Step HAS-160 -- Weaknesses in the HAS-V Compression Function -- Security-Preserving Asymmetric Protocol Encapsulation. |
Record Nr. | UNISA-996466255503316 |
Berlin, Germany : , : Springer, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Systems Security [[electronic resource] ] : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XV, 388 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Computer security Application software Information storage and retrieval Management information systems Computer science Data encryption (Computer science) Computer Communication Networks Systems and Data Security Information Systems Applications (incl. Internet) Information Storage and Retrieval Management of Computing and Information Systems Cryptology |
ISBN | 3-642-25560-4 |
Classificazione |
004
DAT 461f DAT 959f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465923403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Intelligent Virtual Agents [[electronic resource] ] : 10th International Conference, IVA 2010, Philadelphia, PA, USA. Proceedings / / edited by Jan Allbeck, Norman Badler, Timothy Bickmore, Catherine Pelachaud, Alla Safonova |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XI, 490 p. 153 illus.) |
Disciplina | 006.8 |
Collana | Lecture Notes in Artificial Intelligence |
Soggetto topico |
Artificial intelligence
Application software Computer communication systems Software engineering User interfaces (Computer systems) Computer simulation Artificial Intelligence Information Systems Applications (incl. Internet) Computer Communication Networks Software Engineering User Interfaces and Human Computer Interaction Simulation and Modeling |
Soggetto genere / forma | Kongress 2010 |
ISBN |
1-280-38920-6
9786613567123 3-642-15892-7 |
Classificazione | 004 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Behavior Modeling -- Constraints-Based Complex Behavior in Rich Environments -- Smart Events and Primed Agents -- Using Artificial Team Members for Team Training in Virtual Environments -- A Comprehensive Taxonomy of Human Motives: A Principled Basis for the Motives of Intelligent Agents -- The Impact of a Mixed Reality Display Configuration on User Behavior with a Virtual Human -- A Multimodal Real-Time Platform for Studying Human-Avatar Interactions -- Realizing Multimodal Behavior -- Gesture and Expression -- Designing an Expressive Avatar of a Real Person -- Interactive Motion Modeling and Parameterization by Direct Demonstration -- Speed Dating with an Affective Virtual Agent - Developing a Testbed for Emotion Models -- Individualized Gesturing Outperforms Average Gesturing – Evaluating Gesture Production in Virtual Humans -- Level of Detail Based Behavior Control for Virtual Characters -- Virtual Agents Based Simulation for Training Healthcare Workers in Hand Hygiene Procedures -- Modeling Behavioral Manifestations of Coordination and Rapport over Multiple Conversations -- DelsArtMap: Applying Delsarte’s Aesthetic System to Virtual Agents -- Backchannels and Simulation -- Backchannel Strategies for Artificial Listeners -- Learning Backchannel Prediction Model from Parasocial Consensus Sampling: A Subjective Evaluation -- RIDE: A Simulator for Robotic Intelligence Development -- A Velocity-Based Approach for Simulating Human Collision Avoidance -- Influence of Personality Traits on Backchannel Selection -- Multimodal Backchannels for Embodied Conversational Agents -- A Virtual Interpreter for the Italian Sign Language -- Personality -- How Our Personality Shapes Our Interactions with Virtual Characters - Implications for Research and Development -- Evaluating the Effect of Gesture and Language on Personality Perception in Conversational Agents -- Developing Interpersonal Relationships with Virtual Agents through Social Instructional Dialog -- Multiple Agent Roles in an Adaptive Virtual Classroom Environment -- Creating Individual Agents through Personality Traits -- Bossy or Wimpy: Expressing Social Dominance by Combining Gaze and Linguistic Behaviors -- Interaction Strategies -- Warmth, Competence, Believability and Virtual Agents -- Ada and Grace: Toward Realistic and Engaging Virtual Museum Guides -- Interaction Strategies for an Affective Conversational Agent -- ”Why Can’t We Be Friends?” An Empathic Game Companion for Long-Term Interaction -- Towards an Episodic Memory for Companion Dialogue -- Generating Culture-Specific Gestures for Virtual Agent Dialogs -- Avatars in Conversation: The Importance of Simulating Territorial Behavior -- The Impact of Linguistic and Cultural Congruity on Persuasion by Conversational Agents -- A Multiparty Multimodal Architecture for Realtime Turntaking -- Emotion -- The Influence of Emotions in Embodied Agents on Human Decision-Making -- Dimensional Emotion Prediction from Spontaneous Head Gestures for Interaction with Sensitive Artificial Listeners -- An Intelligent Virtual Agent to Increase Involvement in Financial Services -- Exploration on Affect Sensing from Improvisational Interaction -- Using Virtual Humans to Bootstrap the Creation of Other Virtual Humans -- Making It Personal: End-User Authoring of Health Narratives Delivered by Virtual Agents -- MAY: My Memories Are Yours -- Expression of Behaviors in Assistant Agents as Influences on Rational Execution of Plans -- Reflecting User Faces in Avatars -- User Studies -- How a Virtual Agent Should Smile? -- How Turn-Taking Strategies Influence Users’ Impressions of an Agent -- That Avatar Is Looking at Me! Social Inhibition in Virtual Worlds -- Know Your Users! Empirical Results for Tailoring an Agent´s Nonverbal Behavior to Different User Groups -- The Persona Zero-Effect: Evaluating Virtual Character Benefits on a Learning Task with Repeated Interactions -- High Score! - Motivation Strategies for User Participation in Virtual Human Development. |
Record Nr. | UNISA-996465896403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Intelligent Virtual Agents [[electronic resource] ] : 10th International Conference, IVA 2010, Philadelphia, PA, USA. Proceedings / / edited by Jan Allbeck, Norman Badler, Timothy Bickmore, Catherine Pelachaud, Alla Safonova |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XI, 490 p. 153 illus.) |
Disciplina | 006.8 |
Collana | Lecture Notes in Artificial Intelligence |
Soggetto topico |
Artificial intelligence
Application software Computer communication systems Software engineering User interfaces (Computer systems) Computer simulation Artificial Intelligence Information Systems Applications (incl. Internet) Computer Communication Networks Software Engineering User Interfaces and Human Computer Interaction Simulation and Modeling |
Soggetto genere / forma | Kongress 2010 |
ISBN |
1-280-38920-6
9786613567123 3-642-15892-7 |
Classificazione | 004 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Behavior Modeling -- Constraints-Based Complex Behavior in Rich Environments -- Smart Events and Primed Agents -- Using Artificial Team Members for Team Training in Virtual Environments -- A Comprehensive Taxonomy of Human Motives: A Principled Basis for the Motives of Intelligent Agents -- The Impact of a Mixed Reality Display Configuration on User Behavior with a Virtual Human -- A Multimodal Real-Time Platform for Studying Human-Avatar Interactions -- Realizing Multimodal Behavior -- Gesture and Expression -- Designing an Expressive Avatar of a Real Person -- Interactive Motion Modeling and Parameterization by Direct Demonstration -- Speed Dating with an Affective Virtual Agent - Developing a Testbed for Emotion Models -- Individualized Gesturing Outperforms Average Gesturing – Evaluating Gesture Production in Virtual Humans -- Level of Detail Based Behavior Control for Virtual Characters -- Virtual Agents Based Simulation for Training Healthcare Workers in Hand Hygiene Procedures -- Modeling Behavioral Manifestations of Coordination and Rapport over Multiple Conversations -- DelsArtMap: Applying Delsarte’s Aesthetic System to Virtual Agents -- Backchannels and Simulation -- Backchannel Strategies for Artificial Listeners -- Learning Backchannel Prediction Model from Parasocial Consensus Sampling: A Subjective Evaluation -- RIDE: A Simulator for Robotic Intelligence Development -- A Velocity-Based Approach for Simulating Human Collision Avoidance -- Influence of Personality Traits on Backchannel Selection -- Multimodal Backchannels for Embodied Conversational Agents -- A Virtual Interpreter for the Italian Sign Language -- Personality -- How Our Personality Shapes Our Interactions with Virtual Characters - Implications for Research and Development -- Evaluating the Effect of Gesture and Language on Personality Perception in Conversational Agents -- Developing Interpersonal Relationships with Virtual Agents through Social Instructional Dialog -- Multiple Agent Roles in an Adaptive Virtual Classroom Environment -- Creating Individual Agents through Personality Traits -- Bossy or Wimpy: Expressing Social Dominance by Combining Gaze and Linguistic Behaviors -- Interaction Strategies -- Warmth, Competence, Believability and Virtual Agents -- Ada and Grace: Toward Realistic and Engaging Virtual Museum Guides -- Interaction Strategies for an Affective Conversational Agent -- ”Why Can’t We Be Friends?” An Empathic Game Companion for Long-Term Interaction -- Towards an Episodic Memory for Companion Dialogue -- Generating Culture-Specific Gestures for Virtual Agent Dialogs -- Avatars in Conversation: The Importance of Simulating Territorial Behavior -- The Impact of Linguistic and Cultural Congruity on Persuasion by Conversational Agents -- A Multiparty Multimodal Architecture for Realtime Turntaking -- Emotion -- The Influence of Emotions in Embodied Agents on Human Decision-Making -- Dimensional Emotion Prediction from Spontaneous Head Gestures for Interaction with Sensitive Artificial Listeners -- An Intelligent Virtual Agent to Increase Involvement in Financial Services -- Exploration on Affect Sensing from Improvisational Interaction -- Using Virtual Humans to Bootstrap the Creation of Other Virtual Humans -- Making It Personal: End-User Authoring of Health Narratives Delivered by Virtual Agents -- MAY: My Memories Are Yours -- Expression of Behaviors in Assistant Agents as Influences on Rational Execution of Plans -- Reflecting User Faces in Avatars -- User Studies -- How a Virtual Agent Should Smile? -- How Turn-Taking Strategies Influence Users’ Impressions of an Agent -- That Avatar Is Looking at Me! Social Inhibition in Virtual Worlds -- Know Your Users! Empirical Results for Tailoring an Agent´s Nonverbal Behavior to Different User Groups -- The Persona Zero-Effect: Evaluating Virtual Character Benefits on a Learning Task with Repeated Interactions -- High Score! - Motivation Strategies for User Participation in Virtual Human Development. |
Record Nr. | UNINA-9910484300403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Knowledge science, engineering and management : second international conference, KSEM 2007, Melbourne, Australia, November 28-30, 2007 : proceedings / / edited by Zili Zhang, JoÌrg H Siekmann |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2007] |
Descrizione fisica | 1 online resource (XVI, 669 p.) |
Disciplina | 006.33 |
Collana | Lecture Notes in Artificial Intelligence |
Soggetto topico |
Knowledge acquisition (Expert systems)
Decision making - Data processing Knowledge management |
ISBN | 3-540-76719-3 |
Classificazione |
004
DAT 616f DAT 620f DAT 703f DAT 825f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- Building Relationships and Negotiating Agreements in a Network of Agents -- Knowledge Technologies for the Social Semantic Desktop -- Knowledge-Based Intelligent Engineering Systems in Defence and Security -- Auditing and Mapping the Knowledge Assets of Business Processes – An Empirical Study -- Quotient Space Based Multi-granular Analysis -- Regular Papers -- An Ontology-Based Reasoning Framework for Reaction Mechanisms Simulation -- Identifying Dependency Between Secure Messages for Protocol Analysis -- A Diagrammatic Reasoning System for -- Fuzzy Constraint Logic Programming with Answer Set Semantics -- Prime Implicates for Approximate Reasoning -- Distributed Constraint Satisfaction for Urban Traffic Signal Control -- Convergence Analysis on Approximate Reinforcement Learning -- Combinative Reasoning with RCC5 and Cardinal Direction Relations -- A Merging-Based Approach to Handling Inconsistency in Locally Prioritized Software Requirements -- A Dynamic Description Logic for Representation and Reasoning About Actions -- An Argumentative Reasoning Service for Deliberative Agents -- On Defense Strength of Blocking Defeaters in Admissible Sets -- Ontology-Based Inference for Causal Explanation -- Predicting Partners’ Behaviors in Negotiation by Using Regression Analysis -- Enhancing Web-Based Adaptive Learning with Colored Timed Petri Net -- Proof Explanation for the Semantic Web Using Defeasible Logic -- Automatic Construction of a Lexical Attribute Knowledge Base -- Populating CRAB Ontology Using Context-Profile Based Approaches -- Learning Dependency Model for AMP-Activated Protein Kinase Regulation -- Towards a Wrapper-Driven Ontology-Based Framework for Knowledge Extraction -- A Google-Based Statistical Acquisition Model of Chinese Lexical Concepts -- Learning Concepts from Text Based on the Inner-Constructive Model -- Contextual Proximity Based Term-Weighting for Improved Web Information Retrieval -- Collection Profiling for Collection Fusion in Distributed Information Retrieval Systems -- Integration of Descriptors for Software Component Retrieval -- Framework for Text-Based Conversational User-Interface for Business Applications -- Ontology Mining for Semantic Interpretation of Information Needs -- Knowledge Flow-Based Document Recommendation for Knowledge Sharing -- Finding Similar RSS News Articles Using Correlation-Based Phrase Matching -- Automatic Data Record Detection in Web Pages -- Visualizing Trends in Knowledge Management -- Constructing an Ontology for a Research Program from a Knowledge Science Perspective -- An Ontology of Problem Frames for Guiding Problem Frame Specification -- A Speaker Based Unsupervised Speech Segmentation Algorithm Used in Conversational Speech -- Distributed Knowledge Management Based on Ontological Engineering and Multi-Agent System Towards Semantic Interoperation -- WTPMiner: Efficient Mining of Weighted Frequent Patterns Based on Graph Traversals -- Development of Enhanced Data Mining System to Approximate Empirical Formula for Ship Design -- Research on a Novel Word Co-occurrence Model and Its Application -- Cost-Time Sensitive Decision Tree with Missing Values -- Knowledge in Product and Performance Support -- What Drives Members to Continue Sharing Knowledge in a Virtual Professional Community? The Role of Knowledge Self-efficacy and Satisfaction -- MMFI_DSSW – A New Method to Incrementally Mine Maximal Frequent Itemsets in Transaction Sensitive Sliding Window -- Short Papers -- Term Consistency Checking of Ontology Model Based on Description Logics -- Design and Realization of Advertisement Promotion Based on the Content of Webpage -- Irregular Behavior Recognition Based on Two Types of Treading Tracks Under Particular Scenes -- Ontology-Based Focused Crawling of Deep Web Sources -- Pattern Recognition in Stock Data Based on a New Segmentation Algorithm -- HMM-Based Korean Named Entity Recognition for Information Extraction -- Activity Recognition Based on Hidden Markov Models -- Novel Data Management Algorithms in Peer-to-Peer Content Distribution Networks -- On-Line Monitoring and Diagnosis of Failures Using Control Charts and Fault Tree Analysis (FTA) Based on Digital Production Model -- An Improved NN-SVM Based on K Congener Nearest Neighbors Classification Algorithm -- Handling Contradictions in Default Theories -- Algorithm for Public Transit Trip with Minimal Transfer Times and Shortest Travel Time -- Typed Category Theory-Based Micro-view Emergency Knowledge Representation -- A Chinese Time Ontology -- Toward Patterns for Collaborative Knowledge Creation -- Service-Mining Based on Knowledge and Customer Databases -- A Multi-criteria Decision Support System of Water Resource Allocation Scenarios -- Gödel, Escher, Bach and Super-expertise -- Extracting Features for Verifying WordNet -- A Hybrid Approach for Learning Markov Equivalence Classes of Bayesian Network -- A WSMO-Based Semantic Web Services Discovery Framework in Heterogeneous Ontologies Environment -- Cardinal Direction Relations in 3D Space -- Knowledge Integration on Fresh Food Management -- An Approach to Knowledge Transferring in Science-Policy Process -- Trust Analysis of Web Services Based on a Trust Ontology -- Building Bilingual Ontology from WordNet and Chinese Classified Thesaurus -- An Ontology-Based Framework for Building Adaptable Knowledge Management Systems -- Knowledge Engineering Technique for Cluster Development. |
Record Nr. | UNINA-9910483760303321 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Knowledge science, engineering and management : second international conference, KSEM 2007, Melbourne, Australia, November 28-30, 2007 : proceedings / / edited by Zili Zhang, JoÌrg H Siekmann |
Edizione | [1st ed. 2007.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2007] |
Descrizione fisica | 1 online resource (XVI, 669 p.) |
Disciplina | 006.33 |
Collana | Lecture Notes in Artificial Intelligence |
Soggetto topico |
Knowledge acquisition (Expert systems)
Decision making - Data processing Knowledge management |
ISBN | 3-540-76719-3 |
Classificazione |
004
DAT 616f DAT 620f DAT 703f DAT 825f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- Building Relationships and Negotiating Agreements in a Network of Agents -- Knowledge Technologies for the Social Semantic Desktop -- Knowledge-Based Intelligent Engineering Systems in Defence and Security -- Auditing and Mapping the Knowledge Assets of Business Processes – An Empirical Study -- Quotient Space Based Multi-granular Analysis -- Regular Papers -- An Ontology-Based Reasoning Framework for Reaction Mechanisms Simulation -- Identifying Dependency Between Secure Messages for Protocol Analysis -- A Diagrammatic Reasoning System for -- Fuzzy Constraint Logic Programming with Answer Set Semantics -- Prime Implicates for Approximate Reasoning -- Distributed Constraint Satisfaction for Urban Traffic Signal Control -- Convergence Analysis on Approximate Reinforcement Learning -- Combinative Reasoning with RCC5 and Cardinal Direction Relations -- A Merging-Based Approach to Handling Inconsistency in Locally Prioritized Software Requirements -- A Dynamic Description Logic for Representation and Reasoning About Actions -- An Argumentative Reasoning Service for Deliberative Agents -- On Defense Strength of Blocking Defeaters in Admissible Sets -- Ontology-Based Inference for Causal Explanation -- Predicting Partners’ Behaviors in Negotiation by Using Regression Analysis -- Enhancing Web-Based Adaptive Learning with Colored Timed Petri Net -- Proof Explanation for the Semantic Web Using Defeasible Logic -- Automatic Construction of a Lexical Attribute Knowledge Base -- Populating CRAB Ontology Using Context-Profile Based Approaches -- Learning Dependency Model for AMP-Activated Protein Kinase Regulation -- Towards a Wrapper-Driven Ontology-Based Framework for Knowledge Extraction -- A Google-Based Statistical Acquisition Model of Chinese Lexical Concepts -- Learning Concepts from Text Based on the Inner-Constructive Model -- Contextual Proximity Based Term-Weighting for Improved Web Information Retrieval -- Collection Profiling for Collection Fusion in Distributed Information Retrieval Systems -- Integration of Descriptors for Software Component Retrieval -- Framework for Text-Based Conversational User-Interface for Business Applications -- Ontology Mining for Semantic Interpretation of Information Needs -- Knowledge Flow-Based Document Recommendation for Knowledge Sharing -- Finding Similar RSS News Articles Using Correlation-Based Phrase Matching -- Automatic Data Record Detection in Web Pages -- Visualizing Trends in Knowledge Management -- Constructing an Ontology for a Research Program from a Knowledge Science Perspective -- An Ontology of Problem Frames for Guiding Problem Frame Specification -- A Speaker Based Unsupervised Speech Segmentation Algorithm Used in Conversational Speech -- Distributed Knowledge Management Based on Ontological Engineering and Multi-Agent System Towards Semantic Interoperation -- WTPMiner: Efficient Mining of Weighted Frequent Patterns Based on Graph Traversals -- Development of Enhanced Data Mining System to Approximate Empirical Formula for Ship Design -- Research on a Novel Word Co-occurrence Model and Its Application -- Cost-Time Sensitive Decision Tree with Missing Values -- Knowledge in Product and Performance Support -- What Drives Members to Continue Sharing Knowledge in a Virtual Professional Community? The Role of Knowledge Self-efficacy and Satisfaction -- MMFI_DSSW – A New Method to Incrementally Mine Maximal Frequent Itemsets in Transaction Sensitive Sliding Window -- Short Papers -- Term Consistency Checking of Ontology Model Based on Description Logics -- Design and Realization of Advertisement Promotion Based on the Content of Webpage -- Irregular Behavior Recognition Based on Two Types of Treading Tracks Under Particular Scenes -- Ontology-Based Focused Crawling of Deep Web Sources -- Pattern Recognition in Stock Data Based on a New Segmentation Algorithm -- HMM-Based Korean Named Entity Recognition for Information Extraction -- Activity Recognition Based on Hidden Markov Models -- Novel Data Management Algorithms in Peer-to-Peer Content Distribution Networks -- On-Line Monitoring and Diagnosis of Failures Using Control Charts and Fault Tree Analysis (FTA) Based on Digital Production Model -- An Improved NN-SVM Based on K Congener Nearest Neighbors Classification Algorithm -- Handling Contradictions in Default Theories -- Algorithm for Public Transit Trip with Minimal Transfer Times and Shortest Travel Time -- Typed Category Theory-Based Micro-view Emergency Knowledge Representation -- A Chinese Time Ontology -- Toward Patterns for Collaborative Knowledge Creation -- Service-Mining Based on Knowledge and Customer Databases -- A Multi-criteria Decision Support System of Water Resource Allocation Scenarios -- Gödel, Escher, Bach and Super-expertise -- Extracting Features for Verifying WordNet -- A Hybrid Approach for Learning Markov Equivalence Classes of Bayesian Network -- A WSMO-Based Semantic Web Services Discovery Framework in Heterogeneous Ontologies Environment -- Cardinal Direction Relations in 3D Space -- Knowledge Integration on Fresh Food Management -- An Approach to Knowledge Transferring in Science-Policy Process -- Trust Analysis of Web Services Based on a Trust Ontology -- Building Bilingual Ontology from WordNet and Chinese Classified Thesaurus -- An Ontology-Based Framework for Building Adaptable Knowledge Management Systems -- Knowledge Engineering Technique for Cluster Development. |
Record Nr. | UNISA-996465621903316 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2007] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Logic, Language, Information, and Computation [[electronic resource] ] : 20th International Workshop, WoLLIC 2013, Darmstadt, Germany, August 20-23, 2013, Proceedings / / edited by Leonid Libkin, Ulrich Kohlenbach, Ruy de Queiroz |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 283 p. 15 illus.) |
Disciplina | 005.101/5113 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Machine theory
Artificial intelligence Computer science—Mathematics Computer science Formal Languages and Automata Theory Artificial Intelligence Symbolic and Algebraic Manipulation Computer Science |
ISBN | 3-642-39992-4 |
Classificazione |
004
DAT 540f DAT 710f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Logic and Agent Programming Languages -- Natural Models of Homotopy Type Theory (Abstract) -- Modelling Infinite Structures with Atoms -- Counting in SPARQL Property Paths: Perspectives from Theory and Practice -- Quantitative Approaches to Information Protection -- Perspectives of Dynamic Complexity -- Linear Time Proof Verification on N-Graphs: A Graph Theoretic Approach -- First Order Extensions of Residue Classes and Uniform Circuit Complexity -- Quantum Probabilistic Dyadic Second-Order Logic -- Structural Extensions of Display Calculi: A General Recipe -- The Same, Similar, or Just Completely Different? Equivalence for Argumentation in Light of Logic -- Boolean Dependence Logic and Partially-Ordered Connectives -- Extended Modal Dependence Logic EMDL -- Dependence Logic with Generalized Quantifiers: Axiomatizations -- Continuous Truth II: Reflections -- A Simple Separation Logic -- Independence in Database Relations -- Substructural Logic of Proofs -- Full Lambek Hyperdoctrine: Categorical Semantics for First-Order Substructural Logics -- A Finite Model Property for G¨odel Modal Logics -- Model Checking for Modal Dependence Logic: An Approach through Post’s Lattice -- Ockhamist Propositional Dynamic Logic: A Natural Link between PDL and CTL -- Information, Awareness and Substructural Logics. |
Record Nr. | UNISA-996465952903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Logic, Language, Information, and Computation [[electronic resource] ] : 20th International Workshop, WoLLIC 2013, Darmstadt, Germany, August 20-23, 2013, Proceedings / / edited by Leonid Libkin, Ulrich Kohlenbach, Ruy de Queiroz |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (X, 283 p. 15 illus.) |
Disciplina | 005.101/5113 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Machine theory
Artificial intelligence Computer science—Mathematics Computer science Formal Languages and Automata Theory Artificial Intelligence Symbolic and Algebraic Manipulation Computer Science |
ISBN | 3-642-39992-4 |
Classificazione |
004
DAT 540f DAT 710f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Logic and Agent Programming Languages -- Natural Models of Homotopy Type Theory (Abstract) -- Modelling Infinite Structures with Atoms -- Counting in SPARQL Property Paths: Perspectives from Theory and Practice -- Quantitative Approaches to Information Protection -- Perspectives of Dynamic Complexity -- Linear Time Proof Verification on N-Graphs: A Graph Theoretic Approach -- First Order Extensions of Residue Classes and Uniform Circuit Complexity -- Quantum Probabilistic Dyadic Second-Order Logic -- Structural Extensions of Display Calculi: A General Recipe -- The Same, Similar, or Just Completely Different? Equivalence for Argumentation in Light of Logic -- Boolean Dependence Logic and Partially-Ordered Connectives -- Extended Modal Dependence Logic EMDL -- Dependence Logic with Generalized Quantifiers: Axiomatizations -- Continuous Truth II: Reflections -- A Simple Separation Logic -- Independence in Database Relations -- Substructural Logic of Proofs -- Full Lambek Hyperdoctrine: Categorical Semantics for First-Order Substructural Logics -- A Finite Model Property for G¨odel Modal Logics -- Model Checking for Modal Dependence Logic: An Approach through Post’s Lattice -- Ockhamist Propositional Dynamic Logic: A Natural Link between PDL and CTL -- Information, Awareness and Substructural Logics. |
Record Nr. | UNINA-9910483554103321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|