The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: digital content; digital life; e-learning; Web service; HCI; information security; mobile computing; wireless communication; vehicular technology; image processing; computer graphics; multimedia technologies; computer architecture; SoC; embedded systems; artificial intelligence; knowledge discovery; fuzzy systems; computer networks; Web technologies; biomedical...
The following topics are dealt with: intelligent system design; neural networks, AI and expert systems; evolutionary computation; genetic algorithms; natural language processing & machine translation; artificial life and artificial immune systems; rough and fuzzy rough set; gray system and cloud computing; cognitive radio and computer vision; pattern recognition and machine learning; fuzzy system...
The paper deals with the following topics: algorithms; artificial intelligence; bioinformatics; geoinformatics; communication networks; computer architecture; VLSI; computer security; data mining; databases; distributed systems; financial systems; health informatics; image processing; information science; intelligent control systems; Internet; e-commerce; knowledge creation; middleware; mobile computing;...
The following paper deals with the following topics: high performance computing; information systems; Internet; data mining; artificial intelligence; signal processing; image processing; e-commerce; e-learning; quantum computing; quantum communications; social computing; e-service; middleware; information security; ambient assisted living; wireless communication; software engineering; software testing;...
The following topics are dealt with: ubiquitous computing; networks and information systems; multimedia and visualization; middleware and operating systems; security and privacy; data mining and artificial intelligence; software engineering; Web technology; medical/health informatics; bioinformatics and scientific computing.
Since the tragic events of September 11, security research has become critically important for the entire world. Academics in fields such as computational science, information systems, social sciences, engineering, and medicine have been called on to help enhance our ability to fight violence, terrorism, and other crimes. The US 2002 National Strategy for Homeland Security report identified science...
The traditional IDS can not effectively manage the new continuously changing intrusion detection attacks. To deal with the problem, data mining based intrusion detection methods have been the hot fields in intrusion detection research. An outlier mining based adaptive intrusion detection framework is proposed in this paper. In the proposed framework, the outliers are firstly detected by similarity...
Basing on cognitive ability of human being, the paper constructs a cognitive model that has high, middle and low levels, the model can fit for different students that have not the same cognitive ability. According to learning and rule database, introduces a discursive mechanism to decide cognitive ability of student. With the cognitive model, the paper then designs a client and server based intelligence...
Trust management is important for agent cooperation and security in multi-agent system. Based on rough sets theory, a new trust evaluation method is proposed. The method divides attributes into necessary or unnecessary, calculates attribute weight, and then evaluates trust values by using a decision-making method. Finally, an example shows that it is efficient to evaluate trust by using the method.
Due to the dynamic and anonymous nature of open environments, it is critically important for agents to identify trustful cooperators which work consistently as they claim. In the e-services and e-commerce communities, trust and reputation systems are applied broadly as one kind of decision support systems, and aim to cope with the consistency problems caused by uncertain trust relationships. However,...
The paper deals with the following topics: Artificial Intelligence, Communication Systems, modeling and simulation of Computer systems, Image and Video Processing of Computer Vision, Data Communication, Data Mining, Power Systems, Security, Software Engineering and Wireless Networks.
The following topics area dealt with: network data management; artificial intelligence; data mining; Web engineering; speech processing; computer networks; computer security; human computer interaction; virtual reality; educational software.
The following topics were discussed: knowledge discovery, pattern classification, image classification, natural language processing, neural networks, artificial intelligence, data security, prediction theory, fuzzy logic, data mining, grey systems, medical computing applications, statistics, etc.
At present, most of the intrusion detection systems (IDS) don't have enough flexibility, intelligentization and maintainability in actual application. Through studying and analyzing the intelligence recognition characteristics of ldquoSoftManrdquo (SM), a novel cooperation model for intrusion detection system based on multiSoftMan alliance (MSMIDS) is proposed to solve these problems. This paper discusses...
The following topics are dealt with: databases; algorithms; Web applications; e-technology; real time systems; artificial intelligence and applications; software engineering; networking; security; information retrieval; image processing; multiagent; genetic algorithms; signal processing; pattern recognition and applications; neural networks; data mining; parallel and distributed computing; software...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.