Kim | Artificial Intelligence and Simulation | E-Book | www.sack.de
E-Book

E-Book, Englisch, Band 3397, 716 Seiten, eBook

Reihe: Lecture Notes in Computer Science

Kim Artificial Intelligence and Simulation

13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, Jeju Island, Korea, October 4-6, 2004, Revised Selected Papers
2005
ISBN: 978-3-540-30583-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, Jeju Island, Korea, October 4-6, 2004, Revised Selected Papers

E-Book, Englisch, Band 3397, 716 Seiten, eBook

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-540-30583-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



Kim Artificial Intelligence and Simulation jetzt bestellen!

Zielgruppe


Research


Autoren/Hrsg.


Weitere Infos & Material


Keynotes.- Continuity and Change (Activity) Are Fundamentally Related in DEVS Simulation of Continuous Systems.- Systems Theory: Melding the AI and Simulation Perspectives.- Modeling and Simulation Methodologies I.- Unified Modeling for Singularly Perturbed Systems by Delta Operators: Pole Assignment Case.- A Disaster Relief Simulation Model of a Building Fire.- Evaluation of Transaction Risks of Mean Variance Model Under Identical Variance of the Rate of Return – Simulation in Artificial Market.- Intelligent Control.- Association Rule Discovery in Data Mining by Implementing Principal Component Analysis.- Reorder Decision System Based on the Concept of the Order Risk Using Neural Networks.- Simulation Modeling with Hierarchical Planning: Application to a Metal Manufacturing System.- Computer and Network Security I.- Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction.- NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack.- Recognition of Human Action for Game System.- The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 Network.- HLA and Simulator Interoperation.- Describing the HLA Using the DFSS Formalism.- Proposal of High Level Architecture Extension.- High Performance Modeling for Distributed Simulation.- The Hierarchical Federation Architecture for the Interoperability of ROK and US Simulations.- Manufacturing.- PPSS: CBR System for ERP Project Pre-planning.- A Scheduling Analysis in FMS Using the Transitive Matrix.- Simulation of Artificial Life Model in Game Space.- An Extensible Framework for Advanced Distributed Virtual Environment on Grid.- Agent-Based Modeling.- Diffusion of Word-of-Mouth in Segmented Society: Agent-Based Simulation Approach.- E-mail Classification Agent Using Category Generation and Dynamic Category Hierarchy.- The Investigation of the Agent in the Artificial Market.- Plan-Based Coordination of a Multi-agent System for Protein Structure Prediction.- DEVS Modeling and Simulation.- Using Cell-DEVS for Modeling Complex Cell Spaces.- State Minimization of SP-DEVS.- DEVS Formalism: A Hierarchical Generation Scheme.- Modeling and Simulation Methodologies II.- Does Rational Decision Making Always Lead to High Social Welfare?.- Large-Scale Systems Design: A Revolutionary New Approach in Software Hardware Co-design.- Timed I/O Test Sequences for Discrete Event Model Verification.- Parallel and Distributed Modeling and Simulation I.- A Formal Description Specification for Multi-resolution Modeling (MRM) Based on DEVS Formalism.- Research and Implementation of the Context-Aware Middleware Based on Neural Network.- An Efficient Real-Time Middleware Scheduling Algorithm for Periodic Real-Time Tasks.- Mapping Cooperating GRID Applications by Affinity for Resource Characteristics.- Mobile Computer Network.- Modeling of Policy-Based Network with SVDB.- Timestamp Based Concurrency Control in Broadcast Disks Environment.- Active Information Based RRK Routing for Mobile Ad Hoc Network.- Web-Based Simulation, Natural System.- Applying Web Services and Design Patterns to Modeling and Simulating Real-World Systems.- Ontology Based Integration of Web Databases by Utilizing Web Interfaces.- A Web Services-Based Distributed Simulation Architecture for Hierarchical DEVS Models.- Modeling and Simulation Environments.- Automated Cyber-attack Scenario Generation Using the Symbolic Simulation.- A Discrete Event Simulation Study for Incoming Call Centers of a Telecommunication Service Company.- Requirements Analysis and a Design of Computational Environment for HSE (Human-Sensibility Ergonomics) Simulator.- AI and Simulation.- Using a Clustering Genetic Algorithm to Support Customer Segmentation for Personalized Recommender Systems.- System Properties of Action Theories.- Identification of Gene Interaction Networks Based on Evolutionary Computation.- Component-Based Modeling.- Modeling Software Component Criticality Using a Machine Learning Approach.- Component Architecture Redesigning Approach Using Component Metrics.- A Workflow Variability Design Technique for Dynamic Component Integration.- Watermarking, Semantic.- Measuring Semantic Similarity Based on Weighting Attributes of Edge Counting.- 3D Watermarking Shape Recognition System Using Normal Vector Distribution Modelling.- DWT-Based Image Watermarking for Copyright Protection.- Cropping, Rotation and Scaling Invariant LBX Interleaved Voice-in-Image Watermarking.- Parallel and Distributed Modeling and Simulation II.- Data Aggregation for Wireless Sensor Networks Using Self-organizing Map.- Feasibility and Performance Study of a Shared Disks Cluster for Real-Time Processing.- A Web Cluster Simulator for Performance Analysis of the ALBM Cluster System.- Dynamic Load Balancing Scheme Based on Resource Reservation for Migration of Agent in the Pure P2P Network Environment.- Visualization, Graphics and Animation I.- Application of Feedforward Neural Network for the Deblocking of Low Bit Rate Coded Images.- A Dynamic Bandwidth Allocation Algorithm with Supporting QoS for EPON.- A Layered Scripting Language Technique for Avatar Behavior Representation and Control.- An Integrated Environment Blending Dynamic and Geometry Models.- Computer and Network Security II.- Linux-Based System Modelling for Cyber-attack Simulation.- A Rule Based Approach to Network Fault and Security Diagnosis with Agent Collaboration.- Transient Time Analysis of Network Security Survivability Using DEVS.- A Harmful Content Protection in Peer-to-Peer Networks.- Business Modeling.- Security Agent Model Using Interactive Authentication Database.- Discrete-Event Semantics for Tools for Business Process Modeling in Web-Service Era.- An Architecture Modelling of a Workflow Management System.- Client Authentication Model Using Duplicated Authentication Server Systems.- Visualization, Graphics and Animation II.- Dynamic Visualization of Signal Transduction Pathways from Database Information.- Integrated Term Weighting, Visualization, and User Interface Development for Bioinformation Retrieval.- CONDOCS: A Concept-Based Document Categorization System Using Concept-Probability Vector with Thesaurus.- DEVS Modeling and Simulation.- Using DEVS for Modeling and Simulation of Human Behaviour.- Simulation Semantics for Min-Max DEVS Models.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.