top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information and communications security : 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings / / Sihan Qing, Hideki Imai, Guilin Wang (editors)
Information and communications security : 9th international conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007 : proceedings / / Sihan Qing, Hideki Imai, Guilin Wang (editors)
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer, , [2007]
Descrizione fisica 1 online resource (XIV, 514 p.)
Disciplina 005.8
Collana Lecture notes in computer science
Soggetto topico Computer security
Telecommunication systems - Security measures
ISBN 3-540-77048-8
Classificazione 004
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Authentication and Key Exchange -- Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures -- New Construction of Group Secret Handshakes Based on Pairings -- nPAKE?+?: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords -- An Efficient Password-Only Two-Server Authenticated Key Exchange System -- Digital Signatures -- Formal Definition and Construction of Nominative Signature -- Short Group Signature Without Random Oracles -- (Convertible) Undeniable Signatures Without Random Oracles -- Applications -- A New Dynamic Accumulator for Batch Updates -- Preventing Unofficial Information Propagation -- A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction -- Privacy Protection on Multiple Sensitive Attributes -- Watermarking -- Audio Watermarking Algorithm Based on Centroid and Statistical Features -- A Semi-blind Watermarking Based on Discrete Wavelet Transform -- Fast Implementations -- On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme -- High Speed Modular Divider Based on GCD Algorithm -- MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set -- Compact and Secure Design of Masked AES S-Box -- Applied Cryptography -- Boudot’s Range-Bounded Commitment Scheme Revisited -- Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions -- Secure Multiparty Computation of DNF -- Cryptanalysis -- Square Like Attack on Camellia -- Differential Fault Analysis on CLEFIA -- Extending FORK-256 Attack to the Full Hash Function -- Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard -- Formal Analysis -- A Framework for Game-Based Security Proofs -- What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security -- Modeling Agreement Problems in the Universal Composability Framework -- System Security I -- A System Architecture for History-Based Access Control for XML Documents -- Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing -- Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies -- System Security II -- A Novel Approach for Untrusted Code Execution -- Detection and Diagnosis of Control Interception -- BIOS Security Analysis and a Kind of Trusted BIOS -- Collecting Autonomous Spreading Malware Using High-Interaction Honeypots -- Network Security -- DDoS Attack Detection Algorithms Based on Entropy Computing -- Firewall for Dynamic IP Address in Mobile IPv6 -- Application of the PageRank Algorithm to Alarm Graphs -- Drive-By Pharming.
Record Nr. UNISA-996466253403316
Berlin ; ; Heidelberg : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information security and cryptology - icisc 2007 : 10th international conference, seoul, korea, november 29-30, 2007, proceedings / / edited by Kil-Hyun Nam, Gwangsoo Rhee
Information security and cryptology - icisc 2007 : 10th international conference, seoul, korea, november 29-30, 2007, proceedings / / edited by Kil-Hyun Nam, Gwangsoo Rhee
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany : , : Springer, , [2007]
Descrizione fisica 1 online resource (XIII, 370 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
ISBN 3-540-76788-6
Classificazione 004
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis – I -- Cryptanalysis of a Hash Function Proposed at ICISC 2006 -- Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 -- A Cryptanalysis of the Double-Round Quadratic Cryptosystem -- A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment -- Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments -- Handling Dynamic Information Release -- Cryptanalysis – II -- Improving the Time Complexity of Matsui’s Linear Cryptanalysis -- On Large Distributions for Linear Cryptanalysis -- Passive Attacks on a Class of Authentication Protocols for RFID -- Side Channel Attacks on Irregularly Decimated Generators -- Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module -- Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences -- A Secure Virtual Execution Environment for Untrusted Code -- Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum -- Improving Upon the TET Mode of Operation -- Hash Functions – I -- New Local Collisions for the SHA-2 Hash Family -- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL -- Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4 -- New Results on Impossible Differential Cryptanalysis of Reduced AES -- A Note About the Traceability Properties of Linear Codes -- Power Analysis Attacks on MDPL and DRSL Implementations -- Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier -- Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA -- Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon’s Algorithm -- Hash Functions – II -- Analysis of Multivariate Hash Functions -- Colliding Message Pair for 53-Step HAS-160 -- Weaknesses in the HAS-V Compression Function -- Security-Preserving Asymmetric Protocol Encapsulation.
Record Nr. UNINA-9910483548503321
Berlin, Germany : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security and cryptology - icisc 2007 : 10th international conference, seoul, korea, november 29-30, 2007, proceedings / / edited by Kil-Hyun Nam, Gwangsoo Rhee
Information security and cryptology - icisc 2007 : 10th international conference, seoul, korea, november 29-30, 2007, proceedings / / edited by Kil-Hyun Nam, Gwangsoo Rhee
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany : , : Springer, , [2007]
Descrizione fisica 1 online resource (XIII, 370 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
ISBN 3-540-76788-6
Classificazione 004
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis – I -- Cryptanalysis of a Hash Function Proposed at ICISC 2006 -- Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006 -- A Cryptanalysis of the Double-Round Quadratic Cryptosystem -- A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment -- Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments -- Handling Dynamic Information Release -- Cryptanalysis – II -- Improving the Time Complexity of Matsui’s Linear Cryptanalysis -- On Large Distributions for Linear Cryptanalysis -- Passive Attacks on a Class of Authentication Protocols for RFID -- Side Channel Attacks on Irregularly Decimated Generators -- Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module -- Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences -- A Secure Virtual Execution Environment for Untrusted Code -- Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum -- Improving Upon the TET Mode of Operation -- Hash Functions – I -- New Local Collisions for the SHA-2 Hash Family -- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL -- Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4 -- New Results on Impossible Differential Cryptanalysis of Reduced AES -- A Note About the Traceability Properties of Linear Codes -- Power Analysis Attacks on MDPL and DRSL Implementations -- Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier -- Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA -- Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon’s Algorithm -- Hash Functions – II -- Analysis of Multivariate Hash Functions -- Colliding Message Pair for 53-Step HAS-160 -- Weaknesses in the HAS-V Compression Function -- Security-Preserving Asymmetric Protocol Encapsulation.
Record Nr. UNISA-996466255503316
Berlin, Germany : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Systems Security [[electronic resource] ] : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar
Information Systems Security [[electronic resource] ] : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings / / edited by Sushil Jajodia, Chandan Mazumdar
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XV, 388 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Computer security
Application software
Information storage and retrieval
Management information systems
Computer science
Data encryption (Computer science)
Computer Communication Networks
Systems and Data Security
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Management of Computing and Information Systems
Cryptology
ISBN 3-642-25560-4
Classificazione 004
DAT 461f
DAT 959f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465923403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Intelligent Virtual Agents [[electronic resource] ] : 10th International Conference, IVA 2010, Philadelphia, PA, USA. Proceedings / / edited by Jan Allbeck, Norman Badler, Timothy Bickmore, Catherine Pelachaud, Alla Safonova
Intelligent Virtual Agents [[electronic resource] ] : 10th International Conference, IVA 2010, Philadelphia, PA, USA. Proceedings / / edited by Jan Allbeck, Norman Badler, Timothy Bickmore, Catherine Pelachaud, Alla Safonova
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XI, 490 p. 153 illus.)
Disciplina 006.8
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Artificial intelligence
Application software
Computer communication systems
Software engineering
User interfaces (Computer systems)
Computer simulation
Artificial Intelligence
Information Systems Applications (incl. Internet)
Computer Communication Networks
Software Engineering
User Interfaces and Human Computer Interaction
Simulation and Modeling
Soggetto genere / forma Kongress 2010
ISBN 1-280-38920-6
9786613567123
3-642-15892-7
Classificazione 004
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Behavior Modeling -- Constraints-Based Complex Behavior in Rich Environments -- Smart Events and Primed Agents -- Using Artificial Team Members for Team Training in Virtual Environments -- A Comprehensive Taxonomy of Human Motives: A Principled Basis for the Motives of Intelligent Agents -- The Impact of a Mixed Reality Display Configuration on User Behavior with a Virtual Human -- A Multimodal Real-Time Platform for Studying Human-Avatar Interactions -- Realizing Multimodal Behavior -- Gesture and Expression -- Designing an Expressive Avatar of a Real Person -- Interactive Motion Modeling and Parameterization by Direct Demonstration -- Speed Dating with an Affective Virtual Agent - Developing a Testbed for Emotion Models -- Individualized Gesturing Outperforms Average Gesturing – Evaluating Gesture Production in Virtual Humans -- Level of Detail Based Behavior Control for Virtual Characters -- Virtual Agents Based Simulation for Training Healthcare Workers in Hand Hygiene Procedures -- Modeling Behavioral Manifestations of Coordination and Rapport over Multiple Conversations -- DelsArtMap: Applying Delsarte’s Aesthetic System to Virtual Agents -- Backchannels and Simulation -- Backchannel Strategies for Artificial Listeners -- Learning Backchannel Prediction Model from Parasocial Consensus Sampling: A Subjective Evaluation -- RIDE: A Simulator for Robotic Intelligence Development -- A Velocity-Based Approach for Simulating Human Collision Avoidance -- Influence of Personality Traits on Backchannel Selection -- Multimodal Backchannels for Embodied Conversational Agents -- A Virtual Interpreter for the Italian Sign Language -- Personality -- How Our Personality Shapes Our Interactions with Virtual Characters - Implications for Research and Development -- Evaluating the Effect of Gesture and Language on Personality Perception in Conversational Agents -- Developing Interpersonal Relationships with Virtual Agents through Social Instructional Dialog -- Multiple Agent Roles in an Adaptive Virtual Classroom Environment -- Creating Individual Agents through Personality Traits -- Bossy or Wimpy: Expressing Social Dominance by Combining Gaze and Linguistic Behaviors -- Interaction Strategies -- Warmth, Competence, Believability and Virtual Agents -- Ada and Grace: Toward Realistic and Engaging Virtual Museum Guides -- Interaction Strategies for an Affective Conversational Agent -- ”Why Can’t We Be Friends?” An Empathic Game Companion for Long-Term Interaction -- Towards an Episodic Memory for Companion Dialogue -- Generating Culture-Specific Gestures for Virtual Agent Dialogs -- Avatars in Conversation: The Importance of Simulating Territorial Behavior -- The Impact of Linguistic and Cultural Congruity on Persuasion by Conversational Agents -- A Multiparty Multimodal Architecture for Realtime Turntaking -- Emotion -- The Influence of Emotions in Embodied Agents on Human Decision-Making -- Dimensional Emotion Prediction from Spontaneous Head Gestures for Interaction with Sensitive Artificial Listeners -- An Intelligent Virtual Agent to Increase Involvement in Financial Services -- Exploration on Affect Sensing from Improvisational Interaction -- Using Virtual Humans to Bootstrap the Creation of Other Virtual Humans -- Making It Personal: End-User Authoring of Health Narratives Delivered by Virtual Agents -- MAY: My Memories Are Yours -- Expression of Behaviors in Assistant Agents as Influences on Rational Execution of Plans -- Reflecting User Faces in Avatars -- User Studies -- How a Virtual Agent Should Smile? -- How Turn-Taking Strategies Influence Users’ Impressions of an Agent -- That Avatar Is Looking at Me! Social Inhibition in Virtual Worlds -- Know Your Users! Empirical Results for Tailoring an Agent´s Nonverbal Behavior to Different User Groups -- The Persona Zero-Effect: Evaluating Virtual Character Benefits on a Learning Task with Repeated Interactions -- High Score! - Motivation Strategies for User Participation in Virtual Human Development.
Record Nr. UNISA-996465896403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Intelligent Virtual Agents [[electronic resource] ] : 10th International Conference, IVA 2010, Philadelphia, PA, USA. Proceedings / / edited by Jan Allbeck, Norman Badler, Timothy Bickmore, Catherine Pelachaud, Alla Safonova
Intelligent Virtual Agents [[electronic resource] ] : 10th International Conference, IVA 2010, Philadelphia, PA, USA. Proceedings / / edited by Jan Allbeck, Norman Badler, Timothy Bickmore, Catherine Pelachaud, Alla Safonova
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XI, 490 p. 153 illus.)
Disciplina 006.8
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Artificial intelligence
Application software
Computer communication systems
Software engineering
User interfaces (Computer systems)
Computer simulation
Artificial Intelligence
Information Systems Applications (incl. Internet)
Computer Communication Networks
Software Engineering
User Interfaces and Human Computer Interaction
Simulation and Modeling
Soggetto genere / forma Kongress 2010
ISBN 1-280-38920-6
9786613567123
3-642-15892-7
Classificazione 004
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Behavior Modeling -- Constraints-Based Complex Behavior in Rich Environments -- Smart Events and Primed Agents -- Using Artificial Team Members for Team Training in Virtual Environments -- A Comprehensive Taxonomy of Human Motives: A Principled Basis for the Motives of Intelligent Agents -- The Impact of a Mixed Reality Display Configuration on User Behavior with a Virtual Human -- A Multimodal Real-Time Platform for Studying Human-Avatar Interactions -- Realizing Multimodal Behavior -- Gesture and Expression -- Designing an Expressive Avatar of a Real Person -- Interactive Motion Modeling and Parameterization by Direct Demonstration -- Speed Dating with an Affective Virtual Agent - Developing a Testbed for Emotion Models -- Individualized Gesturing Outperforms Average Gesturing – Evaluating Gesture Production in Virtual Humans -- Level of Detail Based Behavior Control for Virtual Characters -- Virtual Agents Based Simulation for Training Healthcare Workers in Hand Hygiene Procedures -- Modeling Behavioral Manifestations of Coordination and Rapport over Multiple Conversations -- DelsArtMap: Applying Delsarte’s Aesthetic System to Virtual Agents -- Backchannels and Simulation -- Backchannel Strategies for Artificial Listeners -- Learning Backchannel Prediction Model from Parasocial Consensus Sampling: A Subjective Evaluation -- RIDE: A Simulator for Robotic Intelligence Development -- A Velocity-Based Approach for Simulating Human Collision Avoidance -- Influence of Personality Traits on Backchannel Selection -- Multimodal Backchannels for Embodied Conversational Agents -- A Virtual Interpreter for the Italian Sign Language -- Personality -- How Our Personality Shapes Our Interactions with Virtual Characters - Implications for Research and Development -- Evaluating the Effect of Gesture and Language on Personality Perception in Conversational Agents -- Developing Interpersonal Relationships with Virtual Agents through Social Instructional Dialog -- Multiple Agent Roles in an Adaptive Virtual Classroom Environment -- Creating Individual Agents through Personality Traits -- Bossy or Wimpy: Expressing Social Dominance by Combining Gaze and Linguistic Behaviors -- Interaction Strategies -- Warmth, Competence, Believability and Virtual Agents -- Ada and Grace: Toward Realistic and Engaging Virtual Museum Guides -- Interaction Strategies for an Affective Conversational Agent -- ”Why Can’t We Be Friends?” An Empathic Game Companion for Long-Term Interaction -- Towards an Episodic Memory for Companion Dialogue -- Generating Culture-Specific Gestures for Virtual Agent Dialogs -- Avatars in Conversation: The Importance of Simulating Territorial Behavior -- The Impact of Linguistic and Cultural Congruity on Persuasion by Conversational Agents -- A Multiparty Multimodal Architecture for Realtime Turntaking -- Emotion -- The Influence of Emotions in Embodied Agents on Human Decision-Making -- Dimensional Emotion Prediction from Spontaneous Head Gestures for Interaction with Sensitive Artificial Listeners -- An Intelligent Virtual Agent to Increase Involvement in Financial Services -- Exploration on Affect Sensing from Improvisational Interaction -- Using Virtual Humans to Bootstrap the Creation of Other Virtual Humans -- Making It Personal: End-User Authoring of Health Narratives Delivered by Virtual Agents -- MAY: My Memories Are Yours -- Expression of Behaviors in Assistant Agents as Influences on Rational Execution of Plans -- Reflecting User Faces in Avatars -- User Studies -- How a Virtual Agent Should Smile? -- How Turn-Taking Strategies Influence Users’ Impressions of an Agent -- That Avatar Is Looking at Me! Social Inhibition in Virtual Worlds -- Know Your Users! Empirical Results for Tailoring an Agent´s Nonverbal Behavior to Different User Groups -- The Persona Zero-Effect: Evaluating Virtual Character Benefits on a Learning Task with Repeated Interactions -- High Score! - Motivation Strategies for User Participation in Virtual Human Development.
Record Nr. UNINA-9910484300403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Knowledge science, engineering and management : second international conference, KSEM 2007, Melbourne, Australia, November 28-30, 2007 : proceedings / / edited by Zili Zhang, JoÌrg H Siekmann
Knowledge science, engineering and management : second international conference, KSEM 2007, Melbourne, Australia, November 28-30, 2007 : proceedings / / edited by Zili Zhang, JoÌrg H Siekmann
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Descrizione fisica 1 online resource (XVI, 669 p.)
Disciplina 006.33
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Knowledge acquisition (Expert systems)
Decision making - Data processing
Knowledge management
ISBN 3-540-76719-3
Classificazione 004
DAT 616f
DAT 620f
DAT 703f
DAT 825f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Building Relationships and Negotiating Agreements in a Network of Agents -- Knowledge Technologies for the Social Semantic Desktop -- Knowledge-Based Intelligent Engineering Systems in Defence and Security -- Auditing and Mapping the Knowledge Assets of Business Processes – An Empirical Study -- Quotient Space Based Multi-granular Analysis -- Regular Papers -- An Ontology-Based Reasoning Framework for Reaction Mechanisms Simulation -- Identifying Dependency Between Secure Messages for Protocol Analysis -- A Diagrammatic Reasoning System for -- Fuzzy Constraint Logic Programming with Answer Set Semantics -- Prime Implicates for Approximate Reasoning -- Distributed Constraint Satisfaction for Urban Traffic Signal Control -- Convergence Analysis on Approximate Reinforcement Learning -- Combinative Reasoning with RCC5 and Cardinal Direction Relations -- A Merging-Based Approach to Handling Inconsistency in Locally Prioritized Software Requirements -- A Dynamic Description Logic for Representation and Reasoning About Actions -- An Argumentative Reasoning Service for Deliberative Agents -- On Defense Strength of Blocking Defeaters in Admissible Sets -- Ontology-Based Inference for Causal Explanation -- Predicting Partners’ Behaviors in Negotiation by Using Regression Analysis -- Enhancing Web-Based Adaptive Learning with Colored Timed Petri Net -- Proof Explanation for the Semantic Web Using Defeasible Logic -- Automatic Construction of a Lexical Attribute Knowledge Base -- Populating CRAB Ontology Using Context-Profile Based Approaches -- Learning Dependency Model for AMP-Activated Protein Kinase Regulation -- Towards a Wrapper-Driven Ontology-Based Framework for Knowledge Extraction -- A Google-Based Statistical Acquisition Model of Chinese Lexical Concepts -- Learning Concepts from Text Based on the Inner-Constructive Model -- Contextual Proximity Based Term-Weighting for Improved Web Information Retrieval -- Collection Profiling for Collection Fusion in Distributed Information Retrieval Systems -- Integration of Descriptors for Software Component Retrieval -- Framework for Text-Based Conversational User-Interface for Business Applications -- Ontology Mining for Semantic Interpretation of Information Needs -- Knowledge Flow-Based Document Recommendation for Knowledge Sharing -- Finding Similar RSS News Articles Using Correlation-Based Phrase Matching -- Automatic Data Record Detection in Web Pages -- Visualizing Trends in Knowledge Management -- Constructing an Ontology for a Research Program from a Knowledge Science Perspective -- An Ontology of Problem Frames for Guiding Problem Frame Specification -- A Speaker Based Unsupervised Speech Segmentation Algorithm Used in Conversational Speech -- Distributed Knowledge Management Based on Ontological Engineering and Multi-Agent System Towards Semantic Interoperation -- WTPMiner: Efficient Mining of Weighted Frequent Patterns Based on Graph Traversals -- Development of Enhanced Data Mining System to Approximate Empirical Formula for Ship Design -- Research on a Novel Word Co-occurrence Model and Its Application -- Cost-Time Sensitive Decision Tree with Missing Values -- Knowledge in Product and Performance Support -- What Drives Members to Continue Sharing Knowledge in a Virtual Professional Community? The Role of Knowledge Self-efficacy and Satisfaction -- MMFI_DSSW – A New Method to Incrementally Mine Maximal Frequent Itemsets in Transaction Sensitive Sliding Window -- Short Papers -- Term Consistency Checking of Ontology Model Based on Description Logics -- Design and Realization of Advertisement Promotion Based on the Content of Webpage -- Irregular Behavior Recognition Based on Two Types of Treading Tracks Under Particular Scenes -- Ontology-Based Focused Crawling of Deep Web Sources -- Pattern Recognition in Stock Data Based on a New Segmentation Algorithm -- HMM-Based Korean Named Entity Recognition for Information Extraction -- Activity Recognition Based on Hidden Markov Models -- Novel Data Management Algorithms in Peer-to-Peer Content Distribution Networks -- On-Line Monitoring and Diagnosis of Failures Using Control Charts and Fault Tree Analysis (FTA) Based on Digital Production Model -- An Improved NN-SVM Based on K Congener Nearest Neighbors Classification Algorithm -- Handling Contradictions in Default Theories -- Algorithm for Public Transit Trip with Minimal Transfer Times and Shortest Travel Time -- Typed Category Theory-Based Micro-view Emergency Knowledge Representation -- A Chinese Time Ontology -- Toward Patterns for Collaborative Knowledge Creation -- Service-Mining Based on Knowledge and Customer Databases -- A Multi-criteria Decision Support System of Water Resource Allocation Scenarios -- Gödel, Escher, Bach and Super-expertise -- Extracting Features for Verifying WordNet -- A Hybrid Approach for Learning Markov Equivalence Classes of Bayesian Network -- A WSMO-Based Semantic Web Services Discovery Framework in Heterogeneous Ontologies Environment -- Cardinal Direction Relations in 3D Space -- Knowledge Integration on Fresh Food Management -- An Approach to Knowledge Transferring in Science-Policy Process -- Trust Analysis of Web Services Based on a Trust Ontology -- Building Bilingual Ontology from WordNet and Chinese Classified Thesaurus -- An Ontology-Based Framework for Building Adaptable Knowledge Management Systems -- Knowledge Engineering Technique for Cluster Development.
Record Nr. UNINA-9910483760303321
Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Knowledge science, engineering and management : second international conference, KSEM 2007, Melbourne, Australia, November 28-30, 2007 : proceedings / / edited by Zili Zhang, JoÌrg H Siekmann
Knowledge science, engineering and management : second international conference, KSEM 2007, Melbourne, Australia, November 28-30, 2007 : proceedings / / edited by Zili Zhang, JoÌrg H Siekmann
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Descrizione fisica 1 online resource (XVI, 669 p.)
Disciplina 006.33
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Knowledge acquisition (Expert systems)
Decision making - Data processing
Knowledge management
ISBN 3-540-76719-3
Classificazione 004
DAT 616f
DAT 620f
DAT 703f
DAT 825f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Building Relationships and Negotiating Agreements in a Network of Agents -- Knowledge Technologies for the Social Semantic Desktop -- Knowledge-Based Intelligent Engineering Systems in Defence and Security -- Auditing and Mapping the Knowledge Assets of Business Processes – An Empirical Study -- Quotient Space Based Multi-granular Analysis -- Regular Papers -- An Ontology-Based Reasoning Framework for Reaction Mechanisms Simulation -- Identifying Dependency Between Secure Messages for Protocol Analysis -- A Diagrammatic Reasoning System for -- Fuzzy Constraint Logic Programming with Answer Set Semantics -- Prime Implicates for Approximate Reasoning -- Distributed Constraint Satisfaction for Urban Traffic Signal Control -- Convergence Analysis on Approximate Reinforcement Learning -- Combinative Reasoning with RCC5 and Cardinal Direction Relations -- A Merging-Based Approach to Handling Inconsistency in Locally Prioritized Software Requirements -- A Dynamic Description Logic for Representation and Reasoning About Actions -- An Argumentative Reasoning Service for Deliberative Agents -- On Defense Strength of Blocking Defeaters in Admissible Sets -- Ontology-Based Inference for Causal Explanation -- Predicting Partners’ Behaviors in Negotiation by Using Regression Analysis -- Enhancing Web-Based Adaptive Learning with Colored Timed Petri Net -- Proof Explanation for the Semantic Web Using Defeasible Logic -- Automatic Construction of a Lexical Attribute Knowledge Base -- Populating CRAB Ontology Using Context-Profile Based Approaches -- Learning Dependency Model for AMP-Activated Protein Kinase Regulation -- Towards a Wrapper-Driven Ontology-Based Framework for Knowledge Extraction -- A Google-Based Statistical Acquisition Model of Chinese Lexical Concepts -- Learning Concepts from Text Based on the Inner-Constructive Model -- Contextual Proximity Based Term-Weighting for Improved Web Information Retrieval -- Collection Profiling for Collection Fusion in Distributed Information Retrieval Systems -- Integration of Descriptors for Software Component Retrieval -- Framework for Text-Based Conversational User-Interface for Business Applications -- Ontology Mining for Semantic Interpretation of Information Needs -- Knowledge Flow-Based Document Recommendation for Knowledge Sharing -- Finding Similar RSS News Articles Using Correlation-Based Phrase Matching -- Automatic Data Record Detection in Web Pages -- Visualizing Trends in Knowledge Management -- Constructing an Ontology for a Research Program from a Knowledge Science Perspective -- An Ontology of Problem Frames for Guiding Problem Frame Specification -- A Speaker Based Unsupervised Speech Segmentation Algorithm Used in Conversational Speech -- Distributed Knowledge Management Based on Ontological Engineering and Multi-Agent System Towards Semantic Interoperation -- WTPMiner: Efficient Mining of Weighted Frequent Patterns Based on Graph Traversals -- Development of Enhanced Data Mining System to Approximate Empirical Formula for Ship Design -- Research on a Novel Word Co-occurrence Model and Its Application -- Cost-Time Sensitive Decision Tree with Missing Values -- Knowledge in Product and Performance Support -- What Drives Members to Continue Sharing Knowledge in a Virtual Professional Community? The Role of Knowledge Self-efficacy and Satisfaction -- MMFI_DSSW – A New Method to Incrementally Mine Maximal Frequent Itemsets in Transaction Sensitive Sliding Window -- Short Papers -- Term Consistency Checking of Ontology Model Based on Description Logics -- Design and Realization of Advertisement Promotion Based on the Content of Webpage -- Irregular Behavior Recognition Based on Two Types of Treading Tracks Under Particular Scenes -- Ontology-Based Focused Crawling of Deep Web Sources -- Pattern Recognition in Stock Data Based on a New Segmentation Algorithm -- HMM-Based Korean Named Entity Recognition for Information Extraction -- Activity Recognition Based on Hidden Markov Models -- Novel Data Management Algorithms in Peer-to-Peer Content Distribution Networks -- On-Line Monitoring and Diagnosis of Failures Using Control Charts and Fault Tree Analysis (FTA) Based on Digital Production Model -- An Improved NN-SVM Based on K Congener Nearest Neighbors Classification Algorithm -- Handling Contradictions in Default Theories -- Algorithm for Public Transit Trip with Minimal Transfer Times and Shortest Travel Time -- Typed Category Theory-Based Micro-view Emergency Knowledge Representation -- A Chinese Time Ontology -- Toward Patterns for Collaborative Knowledge Creation -- Service-Mining Based on Knowledge and Customer Databases -- A Multi-criteria Decision Support System of Water Resource Allocation Scenarios -- Gödel, Escher, Bach and Super-expertise -- Extracting Features for Verifying WordNet -- A Hybrid Approach for Learning Markov Equivalence Classes of Bayesian Network -- A WSMO-Based Semantic Web Services Discovery Framework in Heterogeneous Ontologies Environment -- Cardinal Direction Relations in 3D Space -- Knowledge Integration on Fresh Food Management -- An Approach to Knowledge Transferring in Science-Policy Process -- Trust Analysis of Web Services Based on a Trust Ontology -- Building Bilingual Ontology from WordNet and Chinese Classified Thesaurus -- An Ontology-Based Framework for Building Adaptable Knowledge Management Systems -- Knowledge Engineering Technique for Cluster Development.
Record Nr. UNISA-996465621903316
Berlin, Germany ; ; New York, New York : , : Springer, , [2007]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Logic, Language, Information, and Computation [[electronic resource] ] : 20th International Workshop, WoLLIC 2013, Darmstadt, Germany, August 20-23, 2013, Proceedings / / edited by Leonid Libkin, Ulrich Kohlenbach, Ruy de Queiroz
Logic, Language, Information, and Computation [[electronic resource] ] : 20th International Workshop, WoLLIC 2013, Darmstadt, Germany, August 20-23, 2013, Proceedings / / edited by Leonid Libkin, Ulrich Kohlenbach, Ruy de Queiroz
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 283 p. 15 illus.)
Disciplina 005.101/5113
Collana Theoretical Computer Science and General Issues
Soggetto topico Machine theory
Artificial intelligence
Computer science—Mathematics
Computer science
Formal Languages and Automata Theory
Artificial Intelligence
Symbolic and Algebraic Manipulation
Computer Science
ISBN 3-642-39992-4
Classificazione 004
DAT 540f
DAT 710f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Logic and Agent Programming Languages -- Natural Models of Homotopy Type Theory (Abstract) -- Modelling Infinite Structures with Atoms -- Counting in SPARQL Property Paths: Perspectives from Theory and Practice -- Quantitative Approaches to Information Protection -- Perspectives of Dynamic Complexity -- Linear Time Proof Verification on N-Graphs: A Graph Theoretic Approach -- First Order Extensions of Residue Classes and Uniform Circuit Complexity -- Quantum Probabilistic Dyadic Second-Order Logic -- Structural Extensions of Display Calculi: A General Recipe -- The Same, Similar, or Just Completely Different? Equivalence for Argumentation in Light of Logic -- Boolean Dependence Logic and Partially-Ordered Connectives -- Extended Modal Dependence Logic EMDL -- Dependence Logic with Generalized Quantifiers: Axiomatizations -- Continuous Truth II: Reflections -- A Simple Separation Logic -- Independence in Database Relations -- Substructural Logic of Proofs -- Full Lambek Hyperdoctrine: Categorical Semantics for First-Order Substructural Logics -- A Finite Model Property for G¨odel Modal Logics -- Model Checking for Modal Dependence Logic: An Approach through Post’s Lattice -- Ockhamist Propositional Dynamic Logic: A Natural Link between PDL and CTL -- Information, Awareness and Substructural Logics.
Record Nr. UNISA-996465952903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Logic, Language, Information, and Computation [[electronic resource] ] : 20th International Workshop, WoLLIC 2013, Darmstadt, Germany, August 20-23, 2013, Proceedings / / edited by Leonid Libkin, Ulrich Kohlenbach, Ruy de Queiroz
Logic, Language, Information, and Computation [[electronic resource] ] : 20th International Workshop, WoLLIC 2013, Darmstadt, Germany, August 20-23, 2013, Proceedings / / edited by Leonid Libkin, Ulrich Kohlenbach, Ruy de Queiroz
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 283 p. 15 illus.)
Disciplina 005.101/5113
Collana Theoretical Computer Science and General Issues
Soggetto topico Machine theory
Artificial intelligence
Computer science—Mathematics
Computer science
Formal Languages and Automata Theory
Artificial Intelligence
Symbolic and Algebraic Manipulation
Computer Science
ISBN 3-642-39992-4
Classificazione 004
DAT 540f
DAT 710f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Logic and Agent Programming Languages -- Natural Models of Homotopy Type Theory (Abstract) -- Modelling Infinite Structures with Atoms -- Counting in SPARQL Property Paths: Perspectives from Theory and Practice -- Quantitative Approaches to Information Protection -- Perspectives of Dynamic Complexity -- Linear Time Proof Verification on N-Graphs: A Graph Theoretic Approach -- First Order Extensions of Residue Classes and Uniform Circuit Complexity -- Quantum Probabilistic Dyadic Second-Order Logic -- Structural Extensions of Display Calculi: A General Recipe -- The Same, Similar, or Just Completely Different? Equivalence for Argumentation in Light of Logic -- Boolean Dependence Logic and Partially-Ordered Connectives -- Extended Modal Dependence Logic EMDL -- Dependence Logic with Generalized Quantifiers: Axiomatizations -- Continuous Truth II: Reflections -- A Simple Separation Logic -- Independence in Database Relations -- Substructural Logic of Proofs -- Full Lambek Hyperdoctrine: Categorical Semantics for First-Order Substructural Logics -- A Finite Model Property for G¨odel Modal Logics -- Model Checking for Modal Dependence Logic: An Approach through Post’s Lattice -- Ockhamist Propositional Dynamic Logic: A Natural Link between PDL and CTL -- Information, Awareness and Substructural Logics.
Record Nr. UNINA-9910483554103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui