Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II

Constitutes the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005. This book provides information on fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swa...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Hao, Yue, Liu, Jiming, Wang, Yuping, Cheung, Yiu-ming, Yin, Hujun, Jiao, Licheng, Ma, Jianfeng, Jiao, Yong-Chang
Format: Buch
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume 3802
creator Hao, Yue
Liu, Jiming
Wang, Yuping
Cheung, Yiu-ming
Yin, Hujun
Jiao, Licheng
Ma, Jianfeng
Jiao, Yong-Chang
description Constitutes the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005. This book provides information on fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, and more.
format Book
fullrecord <record><control><sourceid>proquest_askew</sourceid><recordid>TN_cdi_askewsholts_vlebooks_9783540315988</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC3068367</sourcerecordid><originalsourceid>FETCH-LOGICAL-a20049-e00d25298b9d01fadd519eb7c647fb0ff76de285ddd15c51bc51b97dd5a45f443</originalsourceid><addsrcrecordid>eNo1j01LxDAYhCOiuK79D70tHgpJ833UsurCggfFa0mbN1o3NmuTKv57210dGIaBh4E5QZeUM0wJ14qfokxLdehYEc3P0UIKSSRnEl-gLMZ3PInpkgmxQKsqfOzHZFIXeuPzTZ_A--4V-hZy09v8Cdpx6NLPFTpzxkfI_nKJXu7Wz9VDsX2831Q328KU82gBGNuSl1o12mLijLWcaGhkK5h0DXZOCgul4tZawltOmtlaTphh3DFGl-j6OGziDr7jW_Ap1l8emhB2sf5_Nj9VE7s6svshfI4QU33AWujTYHy9vq0oFooKSX8Buu1Q1A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>book</recordtype><pqid>EBC3068367</pqid></control><display><type>book</type><title>Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II</title><source>Springer Books</source><creator>Hao, Yue ; Liu, Jiming ; Wang, Yuping ; Cheung, Yiu-ming ; Yin, Hujun ; Jiao, Licheng ; Ma, Jianfeng ; Jiao, Yong-Chang</creator><creatorcontrib>Hao, Yue ; Liu, Jiming ; Wang, Yuping ; Cheung, Yiu-ming ; Yin, Hujun ; Jiao, Licheng ; Ma, Jianfeng ; Jiao, Yong-Chang</creatorcontrib><description>Constitutes the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005. This book provides information on fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, and more.</description><edition>2005 edition.</edition><identifier>ISBN: 9783540308195</identifier><identifier>ISBN: 3540308199</identifier><identifier>EISBN: 3540315985</identifier><identifier>EISBN: 9783540315988</identifier><identifier>OCLC: 767175470</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin / Heidelberg</publisher><subject>Computational intelligence ; Computer security ; Congresses</subject><creationdate>2005</creationdate><tpages>1204</tpages><format>1204</format><woscitedreferencessubscribed>false</woscitedreferencessubscribed><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>306,780,784,786</link.rule.ids></links><search><creatorcontrib>Hao, Yue</creatorcontrib><creatorcontrib>Liu, Jiming</creatorcontrib><creatorcontrib>Wang, Yuping</creatorcontrib><creatorcontrib>Cheung, Yiu-ming</creatorcontrib><creatorcontrib>Yin, Hujun</creatorcontrib><creatorcontrib>Jiao, Licheng</creatorcontrib><creatorcontrib>Ma, Jianfeng</creatorcontrib><creatorcontrib>Jiao, Yong-Chang</creatorcontrib><title>Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II</title><description>Constitutes the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005. This book provides information on fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, and more.</description><subject>Computational intelligence</subject><subject>Computer security</subject><subject>Congresses</subject><isbn>9783540308195</isbn><isbn>3540308199</isbn><isbn>3540315985</isbn><isbn>9783540315988</isbn><fulltext>true</fulltext><rsrctype>book</rsrctype><creationdate>2005</creationdate><recordtype>book</recordtype><sourceid/><recordid>eNo1j01LxDAYhCOiuK79D70tHgpJ833UsurCggfFa0mbN1o3NmuTKv57210dGIaBh4E5QZeUM0wJ14qfokxLdehYEc3P0UIKSSRnEl-gLMZ3PInpkgmxQKsqfOzHZFIXeuPzTZ_A--4V-hZy09v8Cdpx6NLPFTpzxkfI_nKJXu7Wz9VDsX2831Q328KU82gBGNuSl1o12mLijLWcaGhkK5h0DXZOCgul4tZawltOmtlaTphh3DFGl-j6OGziDr7jW_Ap1l8emhB2sf5_Nj9VE7s6svshfI4QU33AWujTYHy9vq0oFooKSX8Buu1Q1A</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Hao, Yue</creator><creator>Liu, Jiming</creator><creator>Wang, Yuping</creator><creator>Cheung, Yiu-ming</creator><creator>Yin, Hujun</creator><creator>Jiao, Licheng</creator><creator>Ma, Jianfeng</creator><creator>Jiao, Yong-Chang</creator><general>Springer Berlin / Heidelberg</general><general>Springer</general><scope/></search><sort><creationdate>2005</creationdate><title>Computational Intelligence and Security</title><author>Hao, Yue ; Liu, Jiming ; Wang, Yuping ; Cheung, Yiu-ming ; Yin, Hujun ; Jiao, Licheng ; Ma, Jianfeng ; Jiao, Yong-Chang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a20049-e00d25298b9d01fadd519eb7c647fb0ff76de285ddd15c51bc51b97dd5a45f443</frbrgroupid><rsrctype>books</rsrctype><prefilter>books</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Computational intelligence</topic><topic>Computer security</topic><topic>Congresses</topic><toplevel>online_resources</toplevel><creatorcontrib>Hao, Yue</creatorcontrib><creatorcontrib>Liu, Jiming</creatorcontrib><creatorcontrib>Wang, Yuping</creatorcontrib><creatorcontrib>Cheung, Yiu-ming</creatorcontrib><creatorcontrib>Yin, Hujun</creatorcontrib><creatorcontrib>Jiao, Licheng</creatorcontrib><creatorcontrib>Ma, Jianfeng</creatorcontrib><creatorcontrib>Jiao, Yong-Chang</creatorcontrib></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hao, Yue</au><au>Liu, Jiming</au><au>Wang, Yuping</au><au>Cheung, Yiu-ming</au><au>Yin, Hujun</au><au>Jiao, Licheng</au><au>Ma, Jianfeng</au><au>Jiao, Yong-Chang</au><format>book</format><genre>book</genre><ristype>BOOK</ristype><btitle>Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>2005</date><risdate>2005</risdate><volume>3802</volume><isbn>9783540308195</isbn><isbn>3540308199</isbn><eisbn>3540315985</eisbn><eisbn>9783540315988</eisbn><abstract>Constitutes the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005. This book provides information on fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, and more.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin / Heidelberg</pub><oclcid>767175470</oclcid><tpages>1204</tpages><edition>2005 edition.</edition></addata></record>
fulltext fulltext
identifier ISBN: 9783540308195
ispartof
issn
language eng
recordid cdi_askewsholts_vlebooks_9783540315988
source Springer Books
subjects Computational intelligence
Computer security
Congresses
title Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T16%3A05%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_askew&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=book&rft.btitle=Computational%20Intelligence%20and%20Security:%20International%20Conference,%20CIS%202005,%20Xi'an,%20China,%20December%2015-19,%202005,%20Proceedings,%20Part%20II&rft.au=Hao,%20Yue&rft.date=2005&rft.volume=3802&rft.isbn=9783540308195&rft.isbn_list=3540308199&rft_id=info:doi/&rft_dat=%3Cproquest_askew%3EEBC3068367%3C/proquest_askew%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540315985&rft.eisbn_list=9783540315988&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3068367&rft_id=info:pmid/&rfr_iscdi=true