Artificial Intelligence and Security in Computing Systems: 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings
Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston, MA
Springer US
2003
|
Schriftenreihe: | The Springer International Series in Engineering and Computer Science
752 |
Schlagworte: | |
Online-Zugang: | FHI01 BTU01 Volltext |
Zusammenfassung: | Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments. -Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems. -Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects) |
Beschreibung: | 1 Online-Ressource (X, 302 p) |
ISBN: | 9781441992260 |
DOI: | 10.1007/978-1-4419-9226-0 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV045148707 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 180827s2003 |||| o||u| ||||||eng d | ||
020 | |a 9781441992260 |9 978-1-4419-9226-0 | ||
024 | 7 | |a 10.1007/978-1-4419-9226-0 |2 doi | |
035 | |a (ZDB-2-ENG)978-1-4419-9226-0 | ||
035 | |a (OCoLC)1050950906 | ||
035 | |a (DE-599)BVBBV045148707 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-634 | ||
082 | 0 | |a 006.3 |2 23 | |
245 | 1 | 0 | |a Artificial Intelligence and Security in Computing Systems |b 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings |c edited by Jerzy Sołdek, Leszek Drobiazgiewicz |
264 | 1 | |a Boston, MA |b Springer US |c 2003 | |
300 | |a 1 Online-Ressource (X, 302 p) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a The Springer International Series in Engineering and Computer Science |v 752 | |
520 | |a Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments. -Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems. -Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects) | ||
650 | 4 | |a Computer Science | |
650 | 4 | |a Artificial Intelligence (incl. Robotics) | |
650 | 4 | |a Data Encryption | |
650 | 4 | |a Theory of Computation | |
650 | 4 | |a Computer science | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computers | |
650 | 4 | |a Artificial intelligence | |
700 | 1 | |a Sołdek, Jerzy |4 edt | |
700 | 1 | |a Drobiazgiewicz, Leszek |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781461348474 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4419-9226-0 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_2000/2004 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030538406 | ||
966 | e | |u https://doi.org/10.1007/978-1-4419-9226-0 |l FHI01 |p ZDB-2-ENG |q ZDB-2-ENG_2000/2004 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4419-9226-0 |l BTU01 |p ZDB-2-ENG |q ZDB-2-ENG_Archiv |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804178819219718144 |
---|---|
any_adam_object | |
author2 | Sołdek, Jerzy Drobiazgiewicz, Leszek |
author2_role | edt edt |
author2_variant | j s js l d ld |
author_facet | Sołdek, Jerzy Drobiazgiewicz, Leszek |
building | Verbundindex |
bvnumber | BV045148707 |
collection | ZDB-2-ENG |
ctrlnum | (ZDB-2-ENG)978-1-4419-9226-0 (OCoLC)1050950906 (DE-599)BVBBV045148707 |
dewey-full | 006.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3 |
dewey-search | 006.3 |
dewey-sort | 16.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-1-4419-9226-0 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02904nmm a2200493zcb4500</leader><controlfield tag="001">BV045148707</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180827s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781441992260</subfield><subfield code="9">978-1-4419-9226-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4419-9226-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-ENG)978-1-4419-9226-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1050950906</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045148707</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Artificial Intelligence and Security in Computing Systems</subfield><subfield code="b">9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings</subfield><subfield code="c">edited by Jerzy Sołdek, Leszek Drobiazgiewicz</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston, MA</subfield><subfield code="b">Springer US</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (X, 302 p)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The Springer International Series in Engineering and Computer Science</subfield><subfield code="v">752</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments. -Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems. -Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence (incl. Robotics)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Theory of Computation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sołdek, Jerzy</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Drobiazgiewicz, Leszek</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781461348474</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4419-9226-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2000/2004</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030538406</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4419-9226-0</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="q">ZDB-2-ENG_2000/2004</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4419-9226-0</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="q">ZDB-2-ENG_Archiv</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045148707 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:10:01Z |
institution | BVB |
isbn | 9781441992260 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030538406 |
oclc_num | 1050950906 |
open_access_boolean | |
owner | DE-573 DE-634 |
owner_facet | DE-573 DE-634 |
physical | 1 Online-Ressource (X, 302 p) |
psigel | ZDB-2-ENG ZDB-2-ENG_2000/2004 ZDB-2-ENG ZDB-2-ENG_2000/2004 ZDB-2-ENG ZDB-2-ENG_Archiv |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Springer US |
record_format | marc |
series2 | The Springer International Series in Engineering and Computer Science |
spelling | Artificial Intelligence and Security in Computing Systems 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings edited by Jerzy Sołdek, Leszek Drobiazgiewicz Boston, MA Springer US 2003 1 Online-Ressource (X, 302 p) txt rdacontent c rdamedia cr rdacarrier The Springer International Series in Engineering and Computer Science 752 Artificial Intelligence and Security in Computing Systems is a peer-reviewed conference volume focusing on three areas of practice and research progress in information technologies: -Methods of Artificial Intelligence presents methods and algorithms which are the basis for applications of artificial intelligence environments. -Multiagent Systems include laboratory research on multiagent intelligent systems as well as upon their applications in transportation and information systems. -Computer Security and Safety presents techniques and algorithms which will be of great interest to practitioners. In general, they focus on new cryptographic algorithms (including a symmetric key encryption scheme, hash functions, secret generation and sharing schemes, and secure data storage), a formal language for policy access control description and its implementation, and risk management methods (used for continuous analysis both in distributed network and software development projects) Computer Science Artificial Intelligence (incl. Robotics) Data Encryption Theory of Computation Computer science Data encryption (Computer science) Computers Artificial intelligence Sołdek, Jerzy edt Drobiazgiewicz, Leszek edt Erscheint auch als Druck-Ausgabe 9781461348474 https://doi.org/10.1007/978-1-4419-9226-0 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Artificial Intelligence and Security in Computing Systems 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings Computer Science Artificial Intelligence (incl. Robotics) Data Encryption Theory of Computation Computer science Data encryption (Computer science) Computers Artificial intelligence |
title | Artificial Intelligence and Security in Computing Systems 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings |
title_auth | Artificial Intelligence and Security in Computing Systems 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings |
title_exact_search | Artificial Intelligence and Security in Computing Systems 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings |
title_full | Artificial Intelligence and Security in Computing Systems 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings edited by Jerzy Sołdek, Leszek Drobiazgiewicz |
title_fullStr | Artificial Intelligence and Security in Computing Systems 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings edited by Jerzy Sołdek, Leszek Drobiazgiewicz |
title_full_unstemmed | Artificial Intelligence and Security in Computing Systems 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings edited by Jerzy Sołdek, Leszek Drobiazgiewicz |
title_short | Artificial Intelligence and Security in Computing Systems |
title_sort | artificial intelligence and security in computing systems 9th international conference acs 2002 miedzyzdroje poland october 23 25 2002 proceedings |
title_sub | 9th International Conference, ACS’ 2002 Międzyzdroje, Poland October 23–25, 2002 Proceedings |
topic | Computer Science Artificial Intelligence (incl. Robotics) Data Encryption Theory of Computation Computer science Data encryption (Computer science) Computers Artificial intelligence |
topic_facet | Computer Science Artificial Intelligence (incl. Robotics) Data Encryption Theory of Computation Computer science Data encryption (Computer science) Computers Artificial intelligence |
url | https://doi.org/10.1007/978-1-4419-9226-0 |
work_keys_str_mv | AT sołdekjerzy artificialintelligenceandsecurityincomputingsystems9thinternationalconferenceacs2002miedzyzdrojepolandoctober23252002proceedings AT drobiazgiewiczleszek artificialintelligenceandsecurityincomputingsystems9thinternationalconferenceacs2002miedzyzdrojepolandoctober23252002proceedings |