Pattern Recognition and Machine Intelligence [[electronic resource] ] : Third International Conference, PReMI 2009 New Delhi, India, December 16-20, 2009 Proceedings / / edited by Santanu Chaudhury, Sushmita Mitra, C.A. Murthy, P.S. Sastry, Sankar Kumar Pal |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XXI, 631 p.) |
Disciplina | 006.3 |
Collana | Image Processing, Computer Vision, Pattern Recognition, and Graphics |
Soggetto topico |
Pattern recognition
Computers Artificial intelligence Application software Data mining Computer communication systems Pattern Recognition Computation by Abstract Devices Artificial Intelligence Information Systems Applications (incl. Internet) Data Mining and Knowledge Discovery Computer Communication Networks |
Soggetto genere / forma |
Delhi (2009)
Kongress. |
ISBN |
1-280-38342-9
9786613561343 3-642-11164-5 |
Classificazione |
BIO 110f
DAT 708f DAT 760f DAT 770f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Pattern Recognition and Machine Learning -- Soft Computing and Applications -- Bio and Chemo Informatics -- Text and Data Mining -- Image Analysis -- Document Image Processing -- Watermarking and Steganography -- Biometrics -- Image and Video Retrieval -- Speech and Audio Processing -- Applications -- Evolutionary Computing. |
Record Nr. | UNISA-996465902003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Progress in Cryptology - INDOCRYPT 2009 [[electronic resource] ] : 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings / / edited by Bimal Kumar Roy, Nicolas Sendrier |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XV, 443 p.) |
Disciplina | 004n/a |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Data structures (Computer science) Computer security Coding theory Information theory Mathematical logic Cryptology Computer Communication Networks Data Structures and Information Theory Systems and Data Security Coding and Information Theory Mathematical Logic and Formal Languages |
Soggetto genere / forma |
Delhi (2009)
Kongress. |
ISBN |
1-280-38330-5
9786613561220 3-642-10628-5 |
Classificazione |
DAT 465f
SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Post-Quantum Cryptology -- Secure Parameters for SWIFFT -- FSBday -- Key Agreement Protocols -- Reusing Static Keys in Key Agreement Protocols -- A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols -- Side Channel Attacks -- Fault Analysis of Rabbit: Toward a Secret Key Leakage -- On Physical Obfuscation of Cryptographic Algorithms -- Cache Timing Attacks on Clefia -- Symmetric Cryptology -- Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode -- On the Symmetric Negabent Boolean Functions -- Improved Meet-in-the-Middle Attacks on AES -- Hash Functions -- Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode -- Second Preimage Attack on SHAMATA-512 -- Towards Secure and Practical MACs for Body Sensor Networks -- Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions -- A Distinguisher for the Compression Function of SIMD-512 -- Number Theoretic Cryptology -- Sampling from Signed Quadratic Residues: RSA Group Is Pseudofree -- Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller -- A New Hard-Core Predicate of Paillier’s Trapdoor Function -- Lightweight Cryptology -- Private Interrogation of Devices via Identification Codes -- RFID Distance Bounding Multistate Enhancement -- Two Attacks against the F f RFID Protocol -- Signature Protocols -- Efficient Constructions of Signcryption Schemes and Signcryption Composability -- On Generic Constructions of Designated Confirmer Signatures -- Verifiably Encrypted Signatures from RSA without NIZKs -- Identity Based Aggregate Signcryption Schemes -- Multiparty Computation -- Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience -- Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems -- Oblivious Multi-variate Polynomial Evaluation. |
Record Nr. | UNISA-996465898603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Rough Sets, Fuzzy Sets, Data Mining and Granular Computing [[electronic resource] ] : 12th International Conference, RSFDGrC 2009, Delhi, India, December 16-18, 2009, Proceedings / / edited by Hiroshi Sakai, Mihir Chakraborty, Aboul-Ella Hassanien, Dominik Slezak, William Zhu |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XIII, 528 p.) |
Disciplina | 004n/a |
Collana | Lecture Notes in Artificial Intelligence |
Soggetto topico |
Artificial intelligence
Discrete mathematics Computer science—Mathematics Database management Data mining Information storage and retrieval Artificial Intelligence Discrete Mathematics Mathematics of Computing Database Management Data Mining and Knowledge Discovery Information Storage and Retrieval |
Soggetto genere / forma |
Delhi (2009)
Kongress. |
ISBN |
1-280-38332-1
9786613561244 3-642-10646-3 |
Classificazione |
DAT 700f
DAT 718f DAT 773f MAT 040f SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Plenary Papers and Reports -- Affordance Relations -- Discovering Concurrent Process Models in Data: A Rough Set Approach -- Intelligent Science -- Pattern Structures for Analyzing Complex Data -- Fuzzy Sets and Rough Sets for Scenario Modelling and Analysis -- Innovation Game as a Tool of Chance Discovery -- Rough Set Year in India 2009 -- Foundations of Rough Sets and Beyond -- An Algebraic Semantics for the Logic of Multiple-Source Approximation Systems -- Towards an Algebraic Approach for Cover Based Rough Semantics and Combinations of Approximation Spaces -- New Approach in Defining Rough Approximations -- Rough Set Approximations Based on Granular Labels -- On a Criterion of Similarity between Partitions Based on Rough Set Theory -- On Rough Sets with Structures and Properties -- A Formal Concept Analysis Approach to Rough Data Tables -- Covering Based Approaches to Rough Sets and Implication Lattices -- A Logical Reasoning System of Before-after Relation Based on Bf-EVALPSN -- Some Proof Theoretic Results Depending on Context from the Perspective of Graded Consequence -- Rough Set Algorithms and Applications -- IQuickReduct: An Improvement to Quick Reduct Algorithm -- Dynamic Reduct from Partially Uncertain Data Using Rough Sets -- Approximation of Loss and Risk in Selected Granular Systems -- An Efficient Gene Selection Algorithm Based on Tolerance Rough Set Theory -- Rough Set Based Social Networking Framework to Retrieve User-Centric Information -- Use of Fuzzy Rough Set Attribute Reduction in High Scent Web Page Recommendations -- A Rough Sets Approach for Personalized Support of Face Recognition -- Taking Fuzzy-Rough Application to Mars -- Rough Image Colour Quantisation -- of Speech (POS) Tag Sets Reduction and Analysis Using Rough Set Techniques -- Fuzzy Set Foundations and Applications -- More on Intuitionistic Fuzzy Soft Sets -- On Fuzzy Contra ?-Irresolute Maps -- On Fuzzy Strongly ?-I-Open Sets -- Lattice Structures of Rough Fuzzy Sets -- Analysis of Ergodicity of a Fuzzy Possibilistic Markov Model -- A Fuzzy Random Variable Approach to Restructuring of Rough Sets through Statistical Test -- A New Approach for Solving Fuzzy Maximal Flow Problems -- Peptic Ulcer Detection Using DNA Nanorobot Based on Fuzzy Logic Rules -- Investigations on Benefits Generated By Using Fuzzy Numbers in A TOPSIS Model Developed For Automated Guided Vehicle Selection Problem -- A Multi-criteria Interval-Valued Intuitionistic Fuzzy Group Decision Making for Supplier Selection with TOPSIS Method -- Data Mining and Knowledge Discovery -- The Lower System, the Upper System and Rules with Stability Factor in Non-deterministic Information Systems -- Learning Player Behaviors in Real Time Strategy Games from Real Data -- An Efficient Prediction Model for Diabetic Database Using Soft Computing Techniques -- A Decision Making Model for Vendor-Buyer Inventory Systems -- Software Reliability Prediction Using Group Method of Data Handling -- Mining Temporal Patterns for Humanoid Robot Using Pattern Growth Method -- Multiscale Comparison of Three-Dimensional Trajectories: A Preliminary Step -- Time Series Forecasting Using Hybrid Neuro-Fuzzy Regression Model -- A Fast Support Vector Machine Classification Algorithm Based on Karush-Kuhn-Tucker Conditions -- Data Mining Using Rules Extracted from SVM: An Application to Churn Prediction in Bank Credit Cards -- Clustering and Current Trends in Computing -- Interval Set Cluster Analysis: A Re-formulation -- Rough Entropy Based k-Means Clustering -- Fast Single-Link Clustering Method Based on Tolerance Rough Set Model -- A Novel Possibilistic Fuzzy Leader Clustering Algorithm -- Projected Gustafson Kessel Clustering -- Improved Visual Clustering through Unsupervised Dimensionality Reduction -- An Improved Cluster Oriented Fuzzy Decision Trees -- Combining Naive-Bayesian Classifier and Genetic Clustering for Effective Anomaly Based Intrusion Detection -- Ant Colony Optimisation Classification for Gene Expression Data Analysis -- A Comparative Performance Analysis of Multiple Trial Vectors Differential Evolution and Classical Differential Evolution Variants -- Information Retrieval and Text Mining -- Granular Computing for Text Mining: New Research Challenges and Opportunities -- Polarity Classification of Subjective Words Using Common-Sense Knowledge-Base -- A Weighted Hybrid Fuzzy Result Merging Model for Metasearch -- Comparing Temporal Behavior of Phrases on Multiple Indexes with a Burst Word Detection Method -- A Comparative Study of Pattern Matching Algorithms on Sequences -- BPBM: An Algorithm for String Matching with Wildcards and Length Constraints. |
Record Nr. | UNISA-996465903403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|