Computational Intelligence and Security International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I / [electronic resource] :
edited by Yue Hao, Jiming Liu, Yuping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, Yong-Chang Jiao.
- 1st ed. 2005.
- XLI, 1122 p. online resource.
- Lecture Notes in Artificial Intelligence, 3801 2945-9141 ; .
- Lecture Notes in Artificial Intelligence, 3801 .
Learning and Fuzzy Systems -- Evolutionary Computation -- Intelligent Agents and Systems -- Intelligent Information Retrieval -- Support Vector Machine -- Swarm Intelligence -- Data Mining -- Pattern Recognition -- Applications.
9783540315995
10.1007/11596448 doi
Cryptography.
Data encryption (Computer science).
Artificial intelligence.
Information storage and retrieval systems.
Pattern recognition systems.
Computer science.
Electronic data processing--Management.
Cryptology.
Artificial Intelligence.
Information Storage and Retrieval.
Automated Pattern Recognition.
Theory of Computation.
IT Operations.
QA268
005.824
Learning and Fuzzy Systems -- Evolutionary Computation -- Intelligent Agents and Systems -- Intelligent Information Retrieval -- Support Vector Machine -- Swarm Intelligence -- Data Mining -- Pattern Recognition -- Applications.
9783540315995
10.1007/11596448 doi
Cryptography.
Data encryption (Computer science).
Artificial intelligence.
Information storage and retrieval systems.
Pattern recognition systems.
Computer science.
Electronic data processing--Management.
Cryptology.
Artificial Intelligence.
Information Storage and Retrieval.
Automated Pattern Recognition.
Theory of Computation.
IT Operations.
QA268
005.824