Title:
Computational intelligence and security : international conference, CIS 2006, Guangzhou, China, November 3-6, 2006, revised selected papers
Conference Author:
Series:
Lecture notes in computer science, 4456
Publication Information:
Berlin : Springer, 2007
Physical Description:
xxiii, 1118 p. : ill. ; 24 cm.
ISBN:
9783540743767
General Note:
Available online version
Electronic Access:
FulltextAvailable:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010164740 | Q342 C57 2007 | Open Access Book | Proceedings, Conference, Workshop etc. | Searching... |
On Order
Summary
Summary
The refereed post-proceedings of the International Conference on Computational Intelligence and Security are presented in this volume. The 116 papers were submitted to two rounds of careful review. Papers cover bio-inspired computing, evolutionary computation, learning systems and multi-agents, cryptography, information processing and intrusion detection, systems and security, image and signal processing, and pattern recognition.
Table of Contents
Bio-inspired Computing | |
An Improved Particle Swarm Optimizer for Truss Structure Optimization | p. 1 |
Two-Phase Quantum Based Evolutionary Algorithm for Multiple Sequence Alignment | p. 11 |
A Further Discussion on Convergence Rate of Immune Genetic Algorithm to Absorbed-State | p. 22 |
Linear Programming Relax-PSO Hybrid Bound Algorithm for a Class of Nonlinear Integer Programming Problems | p. 29 |
An Improved Ant Colony System and Its Application | p. 36 |
Molecular Diagnosis of Tumor Based on Independent Component Analysis and Support Vector Machines | p. 46 |
Gene Selection Using Wilcoxon Rank Sum Test and Support Vector Machine for Cancer Classification | p. 57 |
General Particle Swarm Optimization Based on Simulated Annealing for Multi-specification One-Dimensional Cutting Stock Problem | p. 67 |
Neurodynamic Analysis for the Schur Decomposition of the Box Problems | p. 77 |
A New Model Based Multi-objective PSO Algorithm | p. 87 |
Evolutionary Computation | |
A New Multi-objective Evolutionary Optimisation Algorithm: The Two-Archive Algorithm | p. 95 |
Labeling of Human Motion by Constraint-Based Genetic Algorithm | p. 105 |
Genetic Algorithm and Pareto Optimum Based QoS Multicast Routing Scheme in NGI | p. 115 |
A Centralized Network Design Problem with Genetic Algorithm Approach | p. 123 |
CGA: Chaotic Genetic Algorithm for Fuzzy Job Scheduling in Grid Environment | p. 133 |
Population-Based Extremal Optimization with Adaptive Levy Mutation for Constrained Optimization | p. 144 |
An Analysis About the Asymptotic Convergence of Evolutionary Algorithms | p. 156 |
Seeker Optimization Algorithm | p. 167 |
Game Model Based Co-evolutionary Algorithm and Its Application for Multiobjective Nutrition Decision Making Optimization Problems | p. 177 |
A Novel Optimization Strategy for the Nonlinear Systems Identification | p. 184 |
A New Schema Survival and Construction Theory for One-Point Crossover | p. 191 |
Adaptive Parallel Immune Evolutionary Strategy | p. 202 |
About the Time Complexity of Evolutionary Algorithms Based on Finite Search Space | p. 209 |
Learning Systems and Multi-agents | |
New Radial Basis Function Neural Network Training for Nonlinear and Nonstationary Signals | p. 220 |
Structure-Based Rule Selection Framework for Association Rule Mining of Traffic Accident Data | p. 231 |
A Multi-classification Method of Temporal Data Based on Support Vector Machine | p. 240 |
Towards a Management Paradigm with a Constrained Benchmark for Autonomic Communications | p. 250 |
A Feature Selection Algorithm Based on Discernibility Matrix | p. 259 |
Using Hybrid Hadamard Error Correcting Output Codes for Multi-class Problem Based on Support Vector Machines | p. 270 |
Range Image Based Classification System Using Support Vector Machines | p. 277 |
Two Evolutionary Methods for Learning Bayesian Network Structures | p. 288 |
Fuzzy Q-Map Algorithm for Reinforcement Learning | p. 298 |
Spatial Data Mining with Uncertainty | p. 308 |
Locally Weighted LS-SVM for Fuzzy Nonlinear Regression with Fuzzy Input-Output | p. 317 |
Learning SVM with Varied Example Cost: A kNN Evaluating Approach | p. 326 |
Using Evolving Agents to Critique Subjective Music Compositions | p. 336 |
Multi-agent Coordination Schemas in Decentralized Production Systems | p. 347 |
Ontology-Based RFID System Model for Supporting Semantic Consistency in Ubiquitous Environment | p. 357 |
Multiagent Search Strategy for Combinatorial Optimization Problems in Ant Model | p. 367 |
Cryptography | |
Secure and Efficient Trust Negotiation | p. 374 |
Hardware/Software Co-design of a Secure Ubiquitous System | p. 385 |
Efficient Implementation of Tate Pairing on a Mobile Phone Using Java | p. 396 |
ID-Based (t, n) Threshold Proxy Signcryption for Multi-agent Systems | p. 406 |
A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit | p. 417 |
Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme | p. 427 |
Binary Sequences with Three and Four Level Autocorrelation | p. 435 |
Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its Implementing | p. 443 |
Enhanced Security Scheme for Managing Heterogeneous Server Platforms | p. 451 |
A New Parallel Multiplier for Type II Optimal Normal Basis | p. 460 |
Identity-Based Key-Insulated Signature Without Random Oracles | p. 470 |
Research on a Novel Hashing Stream Cipher | p. 481 |
Secure Password Authentication for Distributed Computing | p. 491 |
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery | p. 502 |
Ternary Tree Based Group Key Management in Dynamic Peer Networks | p. 513 |
Practical Password-Based Authenticated Key Exchange Protocol | p. 523 |
XTR[superscript +]: A Provable Security Public Key Cryptosystem | p. 534 |
Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant | p. 545 |
Linkability Analysis of Some Blind Signature Schemes | p. 556 |
Information Processing and Intrusion Detection | |
An Efficient Device Authentication Protocol Using Bioinformatic | p. 567 |
Subjective and Objective Watermark Detection Using a Novel Approach - Barcode Watermarking | p. 576 |
Forward Secure Threshold Signature Scheme from Bilinear Pairings | p. 587 |
Low-Cost Authentication Protocol of the RFID System Using Partial ID | p. 598 |
A VLSI Implementation of Minutiae Extraction for Secure Fingerprint Authentication | p. 605 |
Image-Adaptive Watermarking Using the Improved Signal to Noise Ratio | p. 616 |
New Malicious Code Detection Based on N-Gram Analysis and Rough Set Theory | p. 626 |
An Efficient Watermarking Technique Using ADEW and CBWT for Copyright Protection | p. 634 |
An Image Protection Scheme Using the Wavelet Coefficients Based on Fingerprinting Technique | p. 642 |
iOBS3: An iSCSI-Based Object Storage Security System | p. 652 |
An Efficient Algorithm for Clustering Search Engine Results | p. 661 |
Network Anomalous Attack Detection Based on Clustering and Classifier | p. 672 |
Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network | p. 683 |
Systems and Security | |
Multisensor Real-Time Risk Assessment Using Continuous-Time Hidden Markov Models | p. 694 |
A Load Scattering Algorithm for Dynamic Routing of Automated Material Handling Systems | p. 704 |
Software Agents Action Securities | p. 714 |
A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks | p. 725 |
Collision-Resilient Multi-state Query Tree Protocol for Fast RFID Tag Identification | p. 733 |
Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec | p. 743 |
An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices | p. 750 |
An Efficient Anonymous Registration Scheme for Mobile IPv4 | p. 758 |
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security | p. 767 |
An Efficient and Secure RFID Security Method with Ownership Transfer | p. 778 |
Security and Privacy on Authentication Protocol for Low-Cost RFID | p. 788 |
Securing Overlay Activities of Peers in Unstructured P2P Networks | p. 795 |
Security Contexts in Autonomic Systems | p. 806 |
Knowledge Structure on Virus for User Education | p. 817 |
An Efficient Anonymous Fingerprinting Protocol | p. 824 |
Senior Executives Commitment to Information Security - from Motivation to Responsibility | p. 833 |
A Hierarchical Key Distribution Scheme for Conditional Access System in DTV Broadcasting | p. 839 |
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature | p. 847 |
Modeling and Simulation for Security Risk Propagation in Critical Information Systems | p. 858 |
Information Assurance Evaluation for Network Information Systems | p. 869 |
Generalization of the Selective-ID Security Model for HIBS Protocols | p. 878 |
Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML | p. 887 |
Generalization of the Selective-ID Security Model for HIBS Protocols | p. 894 |
Discriminatively Learning Selective Averaged One-Dependence Estimators Based on Cross-Entropy Method | p. 903 |
Image-Adaptive Spread Transform Dither Modulation Using Human Visual Model | p. 913 |
Image and Signal Processing | |
Improvement of Film Scratch Inpainting Algorithm Using Sobel Based Isophote Computation over Hilbert Scan Line | p. 924 |
A Watershed Algorithmic Approach for Gray-Scale Skeletonization in Thermal Vein Pattern Biometrics | p. 935 |
Estimation of Source Signals Number and Underdetermined Blind Separation Based on Sparse Representation | p. 943 |
Edge Detection Based on Mathematical Morphology and Iterative Thresholding | p. 953 |
Image Denoising Based on Wavelet Support Vector Machine | p. 963 |
Variational Decomposition Model in Besov Spaces and Negative Hilbert-Sobolev Spaces | p. 972 |
Performance Analysis of Cooperative Hopfield Networks for Stereo Matching | p. 983 |
An Improved Entropy Function and Chaos Optimization Based Scheme for Two-Dimensional Entropic Image Segmentation | p. 991 |
Face Pose Estimation and Synthesis by 2D Morphable Model | p. 1001 |
Study of the Wavelet Basis Selections | p. 1009 |
Pattern Recognition | |
Feature Weighted Rival Penalized EM for Gaussian Mixture Clustering: Automatic Feature and Model Selections in a Single Paradigm | p. 1018 |
Fingerprint Matching Using Invariant Moment Features | p. 1029 |
Survey of Distance Measures for NMF-Based Face Recognition | p. 1039 |
Weighted Kernel Isomap for Data Visualization and Pattern Classification | p. 1050 |
DT-CWT Feature Combined with ONPP for Face Recognition | p. 1058 |
Precise Eye Localization with AdaBoost and Fast Radial Symmetry | p. 1068 |
Real-Time Expression Recognition System Using Active Appearance Model and EFM | p. 1078 |
Feature Extraction Using Histogram Entropies of Euclidean Distances for Vehicle Classification | p. 1085 |
Full-Space LDA with Evolutionary Selection for Face Recognition | p. 1097 |
Subspace KDA Algorithm for Non-linear Feature Extraction in Face Identification | p. 1106 |
Author Index | p. 1115 |