Computational collective intelligence (CCI) is most often understood as a subfield of artificial intelligence (AI) dealing with soft computing methods that enable group decisions to be made or knowledge to be processe...
详细信息
ISBN:
(数字)9783642044410
ISBN:
(纸本)9783642044403
Computational collective intelligence (CCI) is most often understood as a subfield of artificial intelligence (AI) dealing with soft computing methods that enable group decisions to be made or knowledge to be processed among autonomous units acting in distributed environments. The needs for CCI techniques and tools have grown signi- cantly recently as many information systems work in distributed environments and use distributed resources. Web-based systems, social networks and multi-agent systems very often need these tools for working out consistent knowledge states, resolving conflicts and making decisions. Therefore, CCI is of great importance for today’s and future distributed systems. Methodological, theoretical and practical aspects of computational collective int- ligence, such as group decision making, collective action coordination, and knowledge integration, are considered as the form of intelligence that emerges from the collabo- tion and competition of many individuals (artificial and/or natural). The application of multiple computational intelligence technologies such as fuzzy systems, evolutionary computation, neural systems, consensus theory, etc. , can support human and other collective intelligence and create new forms of CCI in natural and/or artificial s- tems.
This book constitutes the refereed proceedings of the 13th International Conference on information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presente...
详细信息
ISBN:
(数字)9783642252433
ISBN:
(纸本)9783642252426
This book constitutes the refereed proceedings of the 13th International Conference on information and Communications Security, ICICS 2011, held in Beijing, China, in November 2011. The 33 revised full papers presented together with an invited talk were carefully reviewed and selected from 141 submissions. The papers are organized in topical sections on digital signatures, public key encryption, cryptographic protocols, applied cryptography, multimedia security, algorithms and evaluation, cryptanalysis, security applications, wireless network security, system security, and network security.
For Wireless Body Area Networks (WBANs), the security of sensitive data of patients is of the utmost importance, particularly in healthcare environments. This study presents a novel methodology for improving the effic...
详细信息
For Wireless Body Area Networks (WBANs), the security of sensitive data of patients is of the utmost importance, particularly in healthcare environments. This study presents a novel methodology for improving the efficacy of signature aggregation in a scenario involving doctors and patients while mitigating concerns about location privacy. Though there have been prior proposals for signature aggregation schemes, the proposed approach seeks to optimize the aggregation process within the considered scenario, thereby improving performance and reducing computational and communication burden. In addition, the proposed scheme integrates a resilient mechanism that safeguards the doctor’s location privacy by utilizing the Chinese Remainder Theorem (CRT). Advanced cryptographic algorithms and location-anonymization techniques are employed in the proposed method to safeguard the confidentiality of the doctors’ location. The security of the proposed scheme is formally analyzed using the Burrows-Abadi-Needham (BAN) logic and formally verified using the automated software validation tool, known as the Scyther tool, and an informal analysis of various security attributes confirms the security robustness of the proposed scheme. The efficacy is evaluated in comparison to analogous works utilizing the Cygwin software. The performance evaluation shows that the proposed scheme has lower communication costs as compared to existing competing schemes. Moreover, the serving ratio in the proposed scheme is high even if the number of patients is low for doctors.
Some of the most challenging problems in science and engineering are being addressed by the integration of computation and science, a research ?eld known as computational science. Computational science plays a vital r...
详细信息
ISBN:
(数字)9783540448631
ISBN:
(纸本)9783540401964
Some of the most challenging problems in science and engineering are being addressed by the integration of computation and science, a research ?eld known as computational science. Computational science plays a vital role in fundamental advances in biology, physics, chemistry, astronomy, and a host of other disciplines. This is through the coordination of computation, data management, access to instrumentation, knowledge synthesis, and the use of new devices. It has an impact on researchers and practitioners in the sciences and beyond. The sheer size of many challenges in computational science dictates the use of supercomputing, parallel and distri- ted processing, grid-based processing, advanced visualization and sophisticated algorithms. At the dawn of the 21st century the series of International Conferences on Computational science (ICCS) was initiated with a ?rst meeting in May 2001 in San Francisco. The success of that meeting motivated the organization of the - cond meeting held in Amsterdam April 21–24, 2002, where over 500 participants pushed the research ?eld further. The International Conference on Computational science 2003 (ICCS 2003) is the follow-up to these earlier conferences. ICCS 2003 is unique, in that it was a single event held at two di?erent sites almost opposite each other on the globe – Melbourne, Australia and St. Petersburg, Russian Federation. The conference ran on the same dates at both locations and all the presented work was published in a single set of proceedings, which you hold in your hands right now.
Privacy is a burden for most organizations, the more complex and wider an organization is, the harder to manage and enforce privacy is.;This book faces the privacy management problem targeting actual large organizati...
详细信息
ISBN:
(数字)9783030599447
ISBN:
(纸本)9783030599430
Privacy is a burden for most organizations, the more complex and wider an organization is, the harder to manage and enforce privacy is.;This book faces the privacy management problem targeting actual large organizations, such as public administrations, including stakeholders in the process of definition of the solution and evaluating the results with its actual integration in four large organizations. The contribution of this book is twofold: a privacy platform that can be customized and used to manage privacy in large organizations; and the process for the design of such a platform, from a state-of-the-art survey on privacy regulations, through the definition of its requirements, its design and its architecture, until the evaluation of the platform.
Recent years have witnessed an increasing prevalence of wearable devices in the public, where atrial fibrillation (AF) detection is a popular application in these devices. Generally, AF detection is performed on cloud...
详细信息
Recent years have witnessed an increasing prevalence of wearable devices in the public, where atrial fibrillation (AF) detection is a popular application in these devices. Generally, AF detection is performed on cloud whereas this paper describes an on-device AF detection method. Technically, compressed sensing (CS) is first used for electrocardiograph (ECG) acquisition. Then QRS detection is proposed to be performed directly on the compressed CS measurements, rather than on the reconstructed signals on the powerful cloud server. Based on the extracted QRS information, AF is determined by quantitatively analyzing the (RR, dRR) plot. Databases with ECG samples collected from both medical-level (MIT-BIH afdb) and wearable ECG devices (Physionet Challenge 2017) are introduced for performance validation. The experiment results well demonstrate that our on-device AF detection algorithm can approach the performance of those implemented on the raw signals. Our proposal is suitable for AF screening directly on the wearable devices, without the support of the data center for signal reconstruction and intelligent analysis.
The two-volume set LNCS 6987 and LNCS 6988 constitutes the refereed proceedings of the International Conference on Web information Systems and Mining, WISM 2011, held in Taiyuan, China, in September 2011. The 112 revi...
详细信息
ISBN:
(数字)9783642239717
ISBN:
(纸本)9783642239700
The two-volume set LNCS 6987 and LNCS 6988 constitutes the refereed proceedings of the International Conference on Web information Systems and Mining, WISM 2011, held in Taiyuan, China, in September 2011. The 112 revised full papers presented were carefully reviewed and selected from 472 submissions. The first volume includes 56 papers organized in the following topical sections: applications on Web information systems; applications of Web mining; distributed systems; e-government and e-commerce; geographic information systems; information security; and intelligent networked systems.
This book constitutes the refereed proceedings of the 8th International Conference on Active Media Technology, AMT 2012, held in Macau, China, in December 2012. The 65 revised full papers were carefully reviewed and s...
详细信息
ISBN:
(数字)9783642352362
ISBN:
(纸本)9783642352355
This book constitutes the refereed proceedings of the 8th International Conference on Active Media Technology, AMT 2012, held in Macau, China, in December 2012.
The 65 revised full papers were carefully reviewed and selected from a numerous submissions. The papers are organized in topical sections on awareness multi-agent systems, data mining, ontology mining, web reasoning, social applications of active media, human-centered computing, personalization and adaptation, smart digital art and e-learning.
This book constitutes the joint refereed proceedings of the 8th International Workshop on Structural and Syntactic Pattern Recognition and the 3rd International Workshop on Statistical Techniques in Pattern Recognitio...
详细信息
ISBN:
(数字)9783540445227
ISBN:
(纸本)9783540679462
This book constitutes the joint refereed proceedings of the 8th International Workshop on Structural and Syntactic Pattern Recognition and the 3rd International Workshop on Statistical Techniques in Pattern Recognition, SSPR 2000 and SPR 2000, held in Alicante, Spain in August/September 2000. The 52 revised full papers presented together with five invited papers and 35 posters were carefully reviewed and selected from a total of 130 submissions. The book offers topical sections on hybrid and combined methods, document image analysis, grammar and language methods, structural matching, graph-based methods, shape analysis, clustering and density estimation, object recognition, general methodology, and feature extraction and selection.
暂无评论