Algorithmic Refinement is part of the theory of the B method both at the refinement and implementation stages. It a sign of how little loop introduction is used in practice at the refinement stage that neither the B-T...
详细信息
The proceedings contain 91 papers. The topics discussed include: logic program synthesis in a higher-order setting;coverability of reset Petri nets and other well-structured transition systems by partial deduction;bin...
ISBN:
(纸本)3540677976
The proceedings contain 91 papers. The topics discussed include: logic program synthesis in a higher-order setting;coverability of reset Petri nets and other well-structured transition systems by partial deduction;binary speed up for logic programs;a new module system for prolog;partial models of extended generalized logic programs;alternating fixpoint theory for logic programs with priority;proving failure in functional logic programs;semantics of input-consuming logic programs;a denotational semantics of defeasible logic;isoinitial semantics for logic programs;abstract syntax for variable binders: an overview;goal-directed proof search in multiple-conclusioned intuitionistic logic;efficient EM learning with tabulation for parameterized logic programs;model generation theorem proving with finite interval constraints;and arc consistency algorithms via iterations of subsumed functions.
The proceedings contain 73 papers. The topics discussed include: rough set approach to knowledge discovery about preferences;toward a self-referential collective intelligence: some philosophical background of the IEML...
ISBN:
(纸本)3642044409
The proceedings contain 73 papers. The topics discussed include: rough set approach to knowledge discovery about preferences;toward a self-referential collective intelligence: some philosophical background of the IEML research program;a-teams and their applications;local search algorithms for core checking in hedonic coalition games;information foraging theory as a form of collective intelligence for social search;SAM: semantic argumentation based model for collaborative knowledge creation and sharing system;a conception for modification of learning scenario in an intelligent e-learning system;Firefly algorithm for continuous constrained optimization tasks;distributed data mining methodology with classification model example;a token-based mutual exclusion approach to improve collaboration in distributed environments;discovering medical knowledge from data in patients' files;and towards an increase of collective intelligence within organizations using trust and reputation models.
The proceedings contain 43 papers. The special focus in this conference is on Modeling and Implementation. The topics include: Visual data mining for business intelligence applications;parallel data mining on large sc...
ISBN:
(纸本)9783540676270
The proceedings contain 43 papers. The special focus in this conference is on Modeling and Implementation. The topics include: Visual data mining for business intelligence applications;parallel data mining on large scale pc cluster;xml query languages in practice;a two-level method for clustering DTDs;inferring DTD to facilitate user-oriented xml document query;an object oriented multidimensional data model for OLAP;applying object-oriented conceptual modeling techniques to the design of multidimensional databases and OLAP applications;an optimal locking scheme in object-oriented database systems;an efficient distributed algorithm for computing association rules;mining association rules with negative items using interest measure;probabilistic approach to association rules in incomplete databases;discovering sequential patterns from non-uniform databases;an effective approach to mining exception class association rules;integrated data management and enterprise models;a virtual private network for virtual enterprise information systems;adaptive online retail web site based on hidden Markov model;a protocol for untraceable electronic cash;materializing web data for OLAP and DSS;hierarchically classifying Chinese web documents without dictionary support and segmentation procedure;web clustering and association rule discovery for web broadcast;a non-Euclidean model for web retrieval;advanced replacement policies for www caching;extending rectangle join algorithms for rectilinear polygons;modeling temporal aspects in hypermedia applications;a dynamic and robust access method for spatial data handling;a new architecture for distributed GIS under internet environment;global view maintenance by using inference relationship among views.
Product information is complex and discrete in terms of design methods and manufacturing processes, its long term retention has for time been a great challenge. This paper presents an initial investigation into the Sm...
详细信息
The proceedings contain 31 papers. The special focus in this conference is on Codes, Cryptology, and Information Security. The topics include: Multidimensional bell inequalities and quantum cryptography;securing the w...
ISBN:
(纸本)9783319186801
The proceedings contain 31 papers. The special focus in this conference is on Codes, Cryptology, and Information Security. The topics include: Multidimensional bell inequalities and quantum cryptography;securing the web of things with role-based access control;on the security of long-lived archiving systems based on the evidence record syntax;on the properties of vectorial functions with plateaued components and their consequences on APN functions;beyond cryptanalysis is software security the next threat for smart cards;a family of quasi-involutive block ciphers easy to mask;a dynamic attribute-based authentication scheme;repeated-root isodual cyclic codes over finite fields;formal enforcement of security policies on parallel systems with risk integration;countermeasures mitigation for designing rich shell code in java card;square code attack on a modified sidelnikov cryptosystem;a family of six-weight reducible cyclic codes and their weight distribution;a note on the existence of self-dual skew codes over finite fields;the weight distribution of a family of lagrangian-grassmannian codes;algorithms of constructing linear and robust codes based on wavelet decomposition and its application;failure of the point blinding countermeasure against fault attack in pairing-based cryptography;impossible differential properties of reduced round streebog;uncovering self code modification in android;performance of LDPC decoding algorithms with a statistical physics theory approach;representation of dorsal hand vein pattern using local binary patterns (LBP);watermarking based multi-biometric fusion approach and factoring RSA moduli with weak prime factors.
Most widely use of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based s...
详细信息
An effective coordination mechanism is central to building large distributed systems. Overcoming limitations of a coordination language can be a major challenge for developers of distributed systems. This paper presen...
详细信息
The 14th internationalconference on Principles of Distributed systems (OPODIS 2010) took place during December 14–17, 2010 in Tozeur, Tunisia. It continued a tradition of successful conferences; Chantilly (1997), Am...
详细信息
ISBN:
(数字)9783642176531
ISBN:
(纸本)9783642176524
The 14th internationalconference on Principles of Distributed systems (OPODIS 2010) took place during December 14–17, 2010 in Tozeur, Tunisia. It continued a tradition of successful conferences; Chantilly (1997), Amiens (1998), Hanoi (1999), Paris (2000), Mexico (2001), Reims (2002), La Martinique (2003), Gre- ble (2004), Pisa (2005), Bordeaux (2006), Guadeloupe (2007), Luxor (2008) and Nˆ?mes (2009). The OPODIS conference constitutes an open forum for the exchange of sta- of-the-art knowledge on distributed computing and systems among researchers from around the world. Following the tradition of the previous events, the p- gram was composed of high-quality contributed papers. The program call for papers looked for original and signi?cant research contributions to the theory, speci?cation, design and implementation of distributed systems, including: – Communication and synchronization protocols – Distributed algorithms, multiprocessor algorithms – Distributed cooperative computing – Embedded systems – Fault-tolerance, reliability, availability – Grid and cluster computing – Location- and context-aware systems – Mobile agents and autonomous robots – Mobile computing and networks – Peer-to-peer systems, overlay networks – Complexity and lower bounds – Performance analysis of distributed systems – Real-time systems – Security issues in distributed computing and systems – Sensor networks: theory and practice – Speci?cation and veri?cation of distributed systems – Testing and experimentation with distributed systems In response to this call for papers, 122 papers were submitted. Each paper was reviewed by at least three reviewers, and judged according to scienti?c and p- sentation quality, originality and relevance to theconference topics.
Internet users often report feelings of stress, anxiety, and a lack of control, often related to uncertainty about the use of algorithms and autonomous systems (AS) behind what they encounter. This may lead to a loss ...
暂无评论