top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Pattern Recognition and Machine Intelligence [[electronic resource] ] : Third International Conference, PReMI 2009 New Delhi, India, December 16-20, 2009 Proceedings / / edited by Santanu Chaudhury, Sushmita Mitra, C.A. Murthy, P.S. Sastry, Sankar Kumar Pal
Pattern Recognition and Machine Intelligence [[electronic resource] ] : Third International Conference, PReMI 2009 New Delhi, India, December 16-20, 2009 Proceedings / / edited by Santanu Chaudhury, Sushmita Mitra, C.A. Murthy, P.S. Sastry, Sankar Kumar Pal
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XXI, 631 p.)
Disciplina 006.3
Collana Image Processing, Computer Vision, Pattern Recognition, and Graphics
Soggetto topico Pattern recognition
Computers
Artificial intelligence
Application software
Data mining
Computer communication systems
Pattern Recognition
Computation by Abstract Devices
Artificial Intelligence
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Computer Communication Networks
Soggetto genere / forma Delhi (2009)
Kongress.
ISBN 1-280-38342-9
9786613561343
3-642-11164-5
Classificazione BIO 110f
DAT 708f
DAT 760f
DAT 770f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Pattern Recognition and Machine Learning -- Soft Computing and Applications -- Bio and Chemo Informatics -- Text and Data Mining -- Image Analysis -- Document Image Processing -- Watermarking and Steganography -- Biometrics -- Image and Video Retrieval -- Speech and Audio Processing -- Applications -- Evolutionary Computing.
Record Nr. UNISA-996465902003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Progress in Cryptology - INDOCRYPT 2009 [[electronic resource] ] : 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings / / edited by Bimal Kumar Roy, Nicolas Sendrier
Progress in Cryptology - INDOCRYPT 2009 [[electronic resource] ] : 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings / / edited by Bimal Kumar Roy, Nicolas Sendrier
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XV, 443 p.)
Disciplina 004n/a
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Data structures (Computer science)
Computer security
Coding theory
Information theory
Mathematical logic
Cryptology
Computer Communication Networks
Data Structures and Information Theory
Systems and Data Security
Coding and Information Theory
Mathematical Logic and Formal Languages
Soggetto genere / forma Delhi (2009)
Kongress.
ISBN 1-280-38330-5
9786613561220
3-642-10628-5
Classificazione DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Post-Quantum Cryptology -- Secure Parameters for SWIFFT -- FSBday -- Key Agreement Protocols -- Reusing Static Keys in Key Agreement Protocols -- A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols -- Side Channel Attacks -- Fault Analysis of Rabbit: Toward a Secret Key Leakage -- On Physical Obfuscation of Cryptographic Algorithms -- Cache Timing Attacks on Clefia -- Symmetric Cryptology -- Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode -- On the Symmetric Negabent Boolean Functions -- Improved Meet-in-the-Middle Attacks on AES -- Hash Functions -- Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode -- Second Preimage Attack on SHAMATA-512 -- Towards Secure and Practical MACs for Body Sensor Networks -- Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions -- A Distinguisher for the Compression Function of SIMD-512 -- Number Theoretic Cryptology -- Sampling from Signed Quadratic Residues: RSA Group Is Pseudofree -- Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller -- A New Hard-Core Predicate of Paillier’s Trapdoor Function -- Lightweight Cryptology -- Private Interrogation of Devices via Identification Codes -- RFID Distance Bounding Multistate Enhancement -- Two Attacks against the F f RFID Protocol -- Signature Protocols -- Efficient Constructions of Signcryption Schemes and Signcryption Composability -- On Generic Constructions of Designated Confirmer Signatures -- Verifiably Encrypted Signatures from RSA without NIZKs -- Identity Based Aggregate Signcryption Schemes -- Multiparty Computation -- Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience -- Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems -- Oblivious Multi-variate Polynomial Evaluation.
Record Nr. UNISA-996465898603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Rough Sets, Fuzzy Sets, Data Mining and Granular Computing [[electronic resource] ] : 12th International Conference, RSFDGrC 2009, Delhi, India, December 16-18, 2009, Proceedings / / edited by Hiroshi Sakai, Mihir Chakraborty, Aboul-Ella Hassanien, Dominik Slezak, William Zhu
Rough Sets, Fuzzy Sets, Data Mining and Granular Computing [[electronic resource] ] : 12th International Conference, RSFDGrC 2009, Delhi, India, December 16-18, 2009, Proceedings / / edited by Hiroshi Sakai, Mihir Chakraborty, Aboul-Ella Hassanien, Dominik Slezak, William Zhu
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 528 p.)
Disciplina 004n/a
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Artificial intelligence
Discrete mathematics
Computer science—Mathematics
Database management
Data mining
Information storage and retrieval
Artificial Intelligence
Discrete Mathematics
Mathematics of Computing
Database Management
Data Mining and Knowledge Discovery
Information Storage and Retrieval
Soggetto genere / forma Delhi (2009)
Kongress.
ISBN 1-280-38332-1
9786613561244
3-642-10646-3
Classificazione DAT 700f
DAT 718f
DAT 773f
MAT 040f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Plenary Papers and Reports -- Affordance Relations -- Discovering Concurrent Process Models in Data: A Rough Set Approach -- Intelligent Science -- Pattern Structures for Analyzing Complex Data -- Fuzzy Sets and Rough Sets for Scenario Modelling and Analysis -- Innovation Game as a Tool of Chance Discovery -- Rough Set Year in India 2009 -- Foundations of Rough Sets and Beyond -- An Algebraic Semantics for the Logic of Multiple-Source Approximation Systems -- Towards an Algebraic Approach for Cover Based Rough Semantics and Combinations of Approximation Spaces -- New Approach in Defining Rough Approximations -- Rough Set Approximations Based on Granular Labels -- On a Criterion of Similarity between Partitions Based on Rough Set Theory -- On Rough Sets with Structures and Properties -- A Formal Concept Analysis Approach to Rough Data Tables -- Covering Based Approaches to Rough Sets and Implication Lattices -- A Logical Reasoning System of Before-after Relation Based on Bf-EVALPSN -- Some Proof Theoretic Results Depending on Context from the Perspective of Graded Consequence -- Rough Set Algorithms and Applications -- IQuickReduct: An Improvement to Quick Reduct Algorithm -- Dynamic Reduct from Partially Uncertain Data Using Rough Sets -- Approximation of Loss and Risk in Selected Granular Systems -- An Efficient Gene Selection Algorithm Based on Tolerance Rough Set Theory -- Rough Set Based Social Networking Framework to Retrieve User-Centric Information -- Use of Fuzzy Rough Set Attribute Reduction in High Scent Web Page Recommendations -- A Rough Sets Approach for Personalized Support of Face Recognition -- Taking Fuzzy-Rough Application to Mars -- Rough Image Colour Quantisation -- of Speech (POS) Tag Sets Reduction and Analysis Using Rough Set Techniques -- Fuzzy Set Foundations and Applications -- More on Intuitionistic Fuzzy Soft Sets -- On Fuzzy Contra ?-Irresolute Maps -- On Fuzzy Strongly ?-I-Open Sets -- Lattice Structures of Rough Fuzzy Sets -- Analysis of Ergodicity of a Fuzzy Possibilistic Markov Model -- A Fuzzy Random Variable Approach to Restructuring of Rough Sets through Statistical Test -- A New Approach for Solving Fuzzy Maximal Flow Problems -- Peptic Ulcer Detection Using DNA Nanorobot Based on Fuzzy Logic Rules -- Investigations on Benefits Generated By Using Fuzzy Numbers in A TOPSIS Model Developed For Automated Guided Vehicle Selection Problem -- A Multi-criteria Interval-Valued Intuitionistic Fuzzy Group Decision Making for Supplier Selection with TOPSIS Method -- Data Mining and Knowledge Discovery -- The Lower System, the Upper System and Rules with Stability Factor in Non-deterministic Information Systems -- Learning Player Behaviors in Real Time Strategy Games from Real Data -- An Efficient Prediction Model for Diabetic Database Using Soft Computing Techniques -- A Decision Making Model for Vendor-Buyer Inventory Systems -- Software Reliability Prediction Using Group Method of Data Handling -- Mining Temporal Patterns for Humanoid Robot Using Pattern Growth Method -- Multiscale Comparison of Three-Dimensional Trajectories: A Preliminary Step -- Time Series Forecasting Using Hybrid Neuro-Fuzzy Regression Model -- A Fast Support Vector Machine Classification Algorithm Based on Karush-Kuhn-Tucker Conditions -- Data Mining Using Rules Extracted from SVM: An Application to Churn Prediction in Bank Credit Cards -- Clustering and Current Trends in Computing -- Interval Set Cluster Analysis: A Re-formulation -- Rough Entropy Based k-Means Clustering -- Fast Single-Link Clustering Method Based on Tolerance Rough Set Model -- A Novel Possibilistic Fuzzy Leader Clustering Algorithm -- Projected Gustafson Kessel Clustering -- Improved Visual Clustering through Unsupervised Dimensionality Reduction -- An Improved Cluster Oriented Fuzzy Decision Trees -- Combining Naive-Bayesian Classifier and Genetic Clustering for Effective Anomaly Based Intrusion Detection -- Ant Colony Optimisation Classification for Gene Expression Data Analysis -- A Comparative Performance Analysis of Multiple Trial Vectors Differential Evolution and Classical Differential Evolution Variants -- Information Retrieval and Text Mining -- Granular Computing for Text Mining: New Research Challenges and Opportunities -- Polarity Classification of Subjective Words Using Common-Sense Knowledge-Base -- A Weighted Hybrid Fuzzy Result Merging Model for Metasearch -- Comparing Temporal Behavior of Phrases on Multiple Indexes with a Burst Word Detection Method -- A Comparative Study of Pattern Matching Algorithms on Sequences -- BPBM: An Algorithm for String Matching with Wildcards and Length Constraints.
Record Nr. UNISA-996465903403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui