You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the three international workshops PAISI 2008, PACCF 2008, and SOCO 2008, held as satellite events of the IEEE International Conference on Intelligence and Security Informatics, ISI 2008, in Taipei, Taiwan, in June 2008. The 55 revised full papers presented were carefully reviewed and selected from the presentations at the workshops. The 21 papers of the Pacific Asia Workshop on Intelligence and Security Informatics (PAISI 2008) cover topics such as information retrieval and event detection, internet security and cybercrime, currency and data protection, cryptography, image and video analysis, privacy issues, social networks, modeling and visualization, and network intrusion detection. The Pacific Asia Workshop on Cybercrime and Computer Forensics (PACCF 2008) furnishes 10 papers about forensic information management, forensic technologies, and forensic principles and tools. The 24 papers of the Workshop on Social Computing (SOCO 2008) are organized in topical sections on social web and social information management, social networks and agent-based modeling, as well as social opinions, e-commerce, security and privacy considerations.
The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http://www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation technology consultant and practitioners to discuss their research and pr- tice related to various IS...
Intelligence and Security Informatics (ISI) is defined as the study of the development and use of advanced information systems and technologies for national, international, and societal security-related applications. With the rise of global terrorism, the field has been given an increasing amount of attention from academic researchers, law enforcement, intelligent experts, information technology consultants and practitioners. SECURITY INFORMATICS is global in scope and perspective. Leading experts will be invited as contributing authors from the US, UK, Denmark, Israel, Singapore, Hong Kong, Taiwan, Europe, etc. It is the first systematic, archival volume treatment of the field and will cover the very latest advances in ISI research and practice. It is organized in four major subject areas: (1) Information and Systems Security, (2) Information Sharing and Analysis in Security Informatics, (3) Infrastructure Protection and Emergency Responses, and (4) National Security and Terrorism Informatics.
This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2006. Gathers 39 revised full papers, 30 revised short papers, and 56 extended poster abstracts, organized in topical sections including intelligence analysis and knowledge discovery; access control, privacy, and cyber trust; surveillance and emergency response; infrastructure protection and cyber security; terrorism informatics and countermeasures; surveillance, bioterrorism, and emergency response.
The purpose of this book is to provide an overview of state-of-the-art methodologies currently utilized for biomedicine and/or bioinformatics-oriented applications. Researchers working in these fields will learn new methods to help tackle their problems.
The 6th ACIS International Conference on Software Engineering, Research, Management and Applications (SERA 2008) was held in Prague in the Czech Republic on August 20 – 22. SERA ’08 featured excellent theoretical and practical contributions in the areas of formal methods and tools, requirements engineering, software process models, communication systems and networks, software quality and evaluation, software engineering, networks and mobile computing, parallel/distributed computing, software testing, reuse and metrics, database retrieval, computer security, software architectures and modeling. Our conference officers selected the best 17 papers from those papers accepted for presentation at the conference in order to publish them in this volume. The papers were chosen based on review scores submitted by members or the program committee, and underwent further rounds of rigorous review.
Artists and creators in interactive art and interaction design have long been conducting research on human-machine interaction. Through artistic, conceptual, social and critical projects, they have shown how interactive digital processes are essential elements for their artistic creations. Resulting prototypes have often reached beyond the art arena into areas such as mobile computing, intelligent ambiences, intelligent architecture, fashionable technologies, ubiquitous computing and pervasive gaming. Many of the early artist-developed interactive technologies have influenced new design practices, products and services of today's media society. This book brings together key theoreticians and practitioners of this field. It shows how historically relevant the issues of interaction and interface design are, as they can be analyzed not only from an engineering point of view but from a social, artistic and conceptual, and even commercial angle as well.
This book covers methods based on a combination of granular computing, rough sets, and knowledge discovery in data mining (KDD). The discussion of KDD foundations based on the rough set approach and granular computing feature illustrative applications.
Evolutionary algorithms are successful biologically inspired meta-heuristics. Their success depends on adequate parameter settings. The question arises: how can evolutionary algorithms learn parameters automatically during the optimization? Evolution strategies gave an answer decades ago: self-adaptation. Their self-adaptive mutation control turned out to be exceptionally successful. But nevertheless self-adaptation has not achieved the attention it deserves. This book introduces various types of self-adaptive parameters for evolutionary computation. Biased mutation for evolution strategies is useful for constrained search spaces. Self-adaptive inversion mutation accelerates the search on combinatorial TSP-like problems. After the analysis of self-adaptive crossover operators the book concentrates on premature convergence of self-adaptive mutation control at the constraint boundary. Besides extensive experiments, statistical tests and some theoretical investigations enrich the analysis of the proposed concepts.
Mechatronic design processes have become shorter and more parallelized, induced by growing time-to-market pressure. Methods that enable quantitative analysis in early design stages are required, should dependability analyses aim to influence the design. Due to the limited amount of data in this phase, the level of uncertainty is high and explicit modeling of these uncertainties becomes necessary. This work introduces new uncertainty-preserving dependability methods for early design stages. These include the propagation of uncertainty through dependability models, the activation of data from similar components for analyses and the integration of uncertain dependability predictions into an optimization framework. It is shown that Dempster-Shafer theory can be an alternative to probability theory in early design stage dependability predictions. Expert estimates can be represented, input uncertainty is propagated through the system and prediction uncertainty can be measured and interpreted. The resulting coherent methodology can be applied to represent the uncertainty in dependability models.