the proceedings contain 36 papers. the special focus in this conference is on Global e-Security. the topics include: A Reasoning Agent for Credit Card Fraud on the Internet Using the Event Calculus;trends in Smartcard...
ISBN:
(纸本)9783540694021
the proceedings contain 36 papers. the special focus in this conference is on Global e-Security. the topics include: A Reasoning Agent for Credit Card Fraud on the Internet Using the Event Calculus;trends in Smartcard Fraud;tracking Online Trails;evaluation of Tools for Protection of Interest against Hacking and Cracking;Testing Dialog-Verification of SIP Phones with Single-Message Denial-of-Service Attacks;Covert Channels in SIP for VoIP Signalling;secure Recognition of Voice-Less Commands Using Videos;an Extended Secret Sharing Scheme for Color Images with Fixed Pixel Expansion;experimental Results on algebraic Analysis of Trivium and Tweaked Trivium;secure Repayable Storage System;A Generalized Model of E-trading for GSR Fair Exchange Protocol;Mobile-PKI Service Model for Ubiquitous Environment;Supporting Security against SYN Flooding Attack in Distributed DoS Via Measuring IPFIX-Based Traffic;multisensor Message Exchange Mechanism;spam Filtering without Text Analysis;collaborative Approach to Network Behavior Analysis;making Concurrent Switching with Input-Output-Queued Switches Practical;user Dynamics in Graphical Authentication Systems;improved Results on algebraic Cryptanalysis of A5/2;a logic for Inclusion of Administrative Domains and Administrators in Multi-domain Authorization;quantum Key Distribution;a Survey of User Authentication Based on Mouse Dynamics;decoding Algorithm of Low Density Parity Check Code;LMIP/AAA: Local Authentication, Authorization and Accounting (AAA) Protocol for Mobile IP;secure Biometrically Based Authentication Protocol for a Public Network Environment;another Security Improvement over the Lin et al.’s E-voting Scheme;a Meta-process for Information Security Risk Management;security Issues in mGovernment;mobile Customer Relationship Management and Mobile Security;IT Governance Metrics, Measurements and Benchmarking.
In this paper we propose a non-clausal representational formalism (of definite formulas) that retains the syntactic flavor and algorithmic advantages of Horn clauses. the notion of a definite formula is generic in the...
详细信息
Although many different models of spatial computation have been proposed, no unifying theory of computation over continuous space-time has yet been developed. Lack of such a theory has made it difficult to compare spa...
详细信息
the proceedings contain 33 papers. the special focus in this conference is on Invited Papers and Regular Papers. the topics include: Uncertain learning agents (abstract);constructing and sharing perceptual distinction...
ISBN:
(纸本)3540643567
the proceedings contain 33 papers. the special focus in this conference is on Invited Papers and Regular Papers. the topics include: Uncertain learning agents (abstract);constructing and sharing perceptual distinctions;on prediction by data compression;induction of feature terms with INDIE;exploiting qualitative knowledge to enhance skill acquisition;integrated learning and planning based on truncating temporal differences;θ-subsumption for structural matching;classification by voting feature intervals;constructing intermediate concepts by decomposition of real functions;conditions for occam's razor applicability and noise elimination;learning different types of new attributes by combining the neural network and iterative attribute construction;metrics on terms and clauses;learning when negative examples abound;a model for generalization based on confirmatory induction;learning linear constraints in inductive logicprogramming;finite-element methods with local triangulation refinement for continuous reinforcement learning problems;inductive genetic programming with decision trees;parallel and distributed search for structure in multivariate time series;compression-based pruning of decision lists;probabilistic incremental program evolution;a system for extracting oblique decision rules from neural networks;inducing and using decision rules in the GRG knowledge discovery system;learning and exploitation do not conflict under minimax optimality;model combination in the multiple-data-batches scenario;search-based class discretization;natural ideal operators in inductive logicprogramming;a case study in loyalty and satisfaction research;ibots learn genuine team solutions;global data analysis and the fragmentation problem in decision tree induction and beyond classification of feature vectors;empirical learning of natural language processing tasks.
SPVT-II is a security protocol verifier based on logicprogramming, in which an accurate verification approach and an abstract verification approach are combined by a non-termination prediction algorithm. the predicti...
详细信息
ISBN:
(纸本)9783642014390
SPVT-II is a security protocol verifier based on logicprogramming, in which an accurate verification approach and an abstract verification approach are combined by a non-termination prediction algorithm. the prediction algorithm predicts non-termination of the solved-form fixpoint of the logic program model of security protocols. In SPVT-II, if the fixpoint is predicted non-termination, then the abstract approach is used to verify protocols, otherwise the accurate approach is used. the combined approach inherits the efficiency of the accurate approach for verifying those security protocols whose fixpoint terminates, and in the abstract-refinement iteration verification framework, the combined approach can be used to incrementally verify security protocols whose fixpoint is predicted non-termination. And in SPVT-II, the non-termination prediction of fixpoint, verification, constructing counterexamples and refinement are all implemented mechanically. the experiment results demonstrate the practicality of our verifier.
As programmable hardware technology gathers momentum, the partitioning of applications into hardware and software will prove to be an increasingly important research area,. Co-design technologies that achieve this par...
详细信息
ISBN:
(纸本)9781595935441
As programmable hardware technology gathers momentum, the partitioning of applications into hardware and software will prove to be an increasingly important research area,. Co-design technologies that achieve this partitioning typically adopt a strategy in which a high level specification is used to synthesise both hardware and software. this paper proposes an alternative approach by which equivalencies between hardware and software components are defined, thereby providing a, common interface between them. this allows logic to be moved between hardware and software while retaining the functional properties of the application. An investigation is carried out to derive equivalencies between software elements of the Java, language and hardware components by appropriate wrapping of the latter. By developing a framework that captures these equivalencies, this paper shows how hardware/software partitioning of a system can be relegated to a, late stage of system development and include both application and virtual machine logic. Copyright 2006 ACM.
this paper proposes a method of developing ladder logic diagram for PLCs via S-method (a structured method of programming routines). From flexible manufacturing industry point of view, engineers can easily understand ...
详细信息
the proceedings contain 60 papers. the topics discussed include: a comparative study of junctionless dual material double gate silicon on insulator (SOI) and silicon on nothing (SON) MOSFET;performance analysis of thr...
ISBN:
(纸本)9781509044269
the proceedings contain 60 papers. the topics discussed include: a comparative study of junctionless dual material double gate silicon on insulator (SOI) and silicon on nothing (SON) MOSFET;performance analysis of three-phase five-level NPC inverter by using triangular and trapezoidal triangular carrier-based modulation techniques;harmonic mitigation of cascaded multilevel inverter with non equal dc sources using hybrid Newton Raphson method;a genetic algorithm tuned Kalman filter for estimating harmonic and inter-harmonic attributes;comparative analysis of junctionless bulk and SOI/SON FinFET;charge plasma based graded channel with dual material double gate JLT for enhance analog/RF performance;analysis of low power feedthrough logic with leakage control technique;architecture of cost-effective, advanced, high data rate baseband data handling system and realization for high resolution remote sensing satellites;RNN based soft sensor for estimation of concentration for a reactive distillation column;implicit language identification system based on random forest and support vector machine for speech;online identification of coherent generators in power system by using SVM;power system state estimation by linear programming under false data injection attack;enhanced fault ride - through ability of DFIG-based wind energy system using superconducting fault current limiter;wells turbine modeling and pi control scheme for OWC plant using Xilinx system generator;and voltage profile improvement in off grid wind turbine system using MGVC and diesel generator.
According to rumors, the early hybrids of object-oriented and deductive languages were mutants that escaped from secret Government AI labs. Whether this is true or not, the fact is that by mid-80’s, database and logi...
详细信息
ISBN:
(纸本)9783540606086
According to rumors, the early hybrids of object-oriented and deductive languages were mutants that escaped from secret Government AI labs. Whether this is true or not, the fact is that by mid-80’s, database and logicprogramming communities began to take notice. the temptation was hard to resist: the object-oriented paradigm provides a better way of manipulating structured objects, while logic and deduction offer the power and flexibility of ad hoc querying and reasoning. thus, hybrid languages have the potential for becoming an ideal turf for cultivating the next generation of information systems. the approaches to integration of the two paradigms range from logic-based languages with unified declarative semantics, to message-passing prologs, to Prolog/C++ cocktails. In the past eight years, my colleagues and I have been developing a unified object-based logic intended to capture most of the essentials of the object-oriented paradigm. the overall plot here is that once the fundamentals are in place, the actual hybrid programming languages can be carved out of the logicthe same way as deductive data languages have been carved out of the classical logic. there are two distinct aspects in object-orientation: structural (the statics) and procedural (the dynamics). the static aspect was somewhat easier to capture in logic and after taking a few wrong turns F-logic was developed [17]. Taming the dynamics was harder, because there was no widely accepted solution to the problem of state changes even for traditional deductive languages. Our recent work on Transaction logic [8, 7] appears to provide an adequate framework for specifying the dynamics in classical deductive languages. this paper first reviews some core aspects of F-logic and Transaction logic, and then shows how the two can be combined in a natural way to yield a unified foundation for future work on deductive object-oriented languages both in theory and practice. At the end, we discuss areas that still remai
the proceedings contain 13 papers. the special focus in this conference is on Artificial Intelligence for Communications and Networks. the topics include: A Research of Infectivity Rate of Seasonal Influenza from Pre-...
ISBN:
(纸本)9783031291258
the proceedings contain 13 papers. the special focus in this conference is on Artificial Intelligence for Communications and Networks. the topics include: A Research of Infectivity Rate of Seasonal Influenza from Pre-infectious Person for Data Driven Simulation;creating Trust Within Population of Evolutionary Computation in an Uncertain Environment Using Blockchain;efficient Inductive logicprogramming Based on Particle Swarm Optimization;fault Diameter of Strong Product Graph of Two Paths;Design and Implementation of SF Selection Based on Distance and SNR Using Autonomous Distributed Reinforcement Learning in LoRa Networks;QBRT: Bias and Rising threshold Algorithm with Q-Learning: Implementation of the Tower of Hanoi;A Study on Effectiveness of BERT Models and Task-Conditioned Reasoning Strategy for Medical Visual Question Answering;deep Robust Neural Networks Inspired by Human Cognitive Bias Against Transfer-based Attacks;efficient Estimation of Cow’s Location Using Machine Learning Based on Sensor Data;A Time Series Forecasting Method Using DBN and Adam Optimization;unity-Bounded Function and Benchmark Design Specifications Targeted for Designing Typical Variable Digital Filters.
暂无评论