Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making 9th Asian Computing Science Conference. Dedicated to Jean-Louis Lassez on the Occasion of His 5th Birthday. Chiang Mai, Thailand, December 8-10, 2004. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Maher, Michael J. (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.
Σειρά:Lecture Notes in Computer Science, 3321
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04697nam a22005655i 4500
001 978-3-540-30502-6
003 DE-He213
005 20151204185913.0
007 cr nn 008mamaa
008 110111s2005 gw | s |||| 0|eng d
020 |a 9783540305026  |9 978-3-540-30502-6 
024 7 |a 10.1007/b103476  |2 doi 
040 |d GrThAP 
050 4 |a QA75.5-76.95 
072 7 |a UY  |2 bicssc 
072 7 |a UYA  |2 bicssc 
072 7 |a COM014000  |2 bisacsh 
072 7 |a COM031000  |2 bisacsh 
082 0 4 |a 004.0151  |2 23 
245 1 0 |a Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making  |h [electronic resource] :  |b 9th Asian Computing Science Conference. Dedicated to Jean-Louis Lassez on the Occasion of His 5th Birthday. Chiang Mai, Thailand, December 8-10, 2004. Proceedings /  |c edited by Michael J. Maher. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2005. 
300 |a XII, 510 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 3321 
505 0 |a Keynote Papers -- Counting by Coin Tossings -- On the Role Definitions in and Beyond Cryptography -- Meme Media for the Knowledge Federation Over the Web and Pervasive Computing Environments -- Contributed Papers -- Probabilistic Space Partitioning in Constraint Logic Programming -- Chi-Square Matrix: An Approach for Building-Block Identification -- Design Exploration Framework Under Impreciseness Based on Register-Constrained Inclusion Scheduling -- Hiord: A Type-Free Higher-Order Logic Programming Language with Predicate Abstraction -- Assessment Aggregation in the Evidential Reasoning Approach to MADM Under Uncertainty: Orthogonal Versus Weighted Sum -- Learnability of Simply-Moded Logic Programs from Entailment -- A Temporalised Belief Logic for Specifying the Dynamics of Trust for Multi-agent Systems -- Using Optimal Golomb Rulers for Minimizing Collisions in Closed Hashing -- Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption -- Deniable Partial Proxy Signatures -- Formal Concept Mining: A Statistic-Based Approach for Pertinent Concept Lattice Construction -- A Robust Approach to Content-Based Musical Genre Classification and Retrieval Using Multi-feature Clustering -- Registration of 3D Range Images Using Particle Swarm Optimization -- Zero-Clairvoyant Scheduling with Inter-period Constraints -- A Novel Texture Synthesis Based Algorithm for Object Removal in Photographs -- Highly Efficient and Effective Techniques for Thai Syllable Speech Recognition -- Robot Visual Servoing Based on Total Jacobian -- Invited Papers -- Online Stochastic and Robust Optimization -- Optimal Constraint Decomposition for Distributed Databases -- Adaptive Random Testing -- Minimal Unsatisfiable Sets: Classification and Bounds -- LPOD Answer Sets and Nash Equilibria -- Graph Theoretic Models for Reasoning About Time -- Rule-Based Programming and Proving: The ELAN Experience Outcomes -- Towards Flexible Graphical Communication Using Adaptive Diagrams -- A Framework for Compiler Driven Design Space Exploration for Embedded System Customization -- Spectral-Based Document Retrieval -- Metadata Inference for Document Retrieval in a Distributed Repository -- A Simple Theory of Expressions, Judgments and Derivations -- Reactive Framework for Resource Aware Distributed Computing -- The Feature Selection and Intrusion Detection Problems -- On the BDD of a Random Boolean Function -- Concurrent Constraint-Based Memory Machines: A Framework for Java Memory Models (Summary). 
650 0 |a Computer science. 
650 0 |a Software engineering. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computers. 
650 0 |a Computer science  |x Mathematics. 
650 0 |a Artificial intelligence. 
650 1 4 |a Computer Science. 
650 2 4 |a Theory of Computation. 
650 2 4 |a Artificial Intelligence (incl. Robotics). 
650 2 4 |a Software Engineering/Programming and Operating Systems. 
650 2 4 |a Data Encryption. 
650 2 4 |a Discrete Mathematics in Computer Science. 
650 2 4 |a Information Systems Applications (incl. Internet). 
700 1 |a Maher, Michael J.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783540240877 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 3321 
856 4 0 |u http://dx.doi.org/10.1007/b103476  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)