2008 International Conference on Computational Intelligence and Security, CIS 2008, 13-17 December 2008, Suzhou, China, Volume 2, Workshop Papers.
IEEE Computer Society 2008, ISBN 978-0-7695-3508-1
Machine Learning and Algorithms
: Particle Swarm Optimization Based on Number-Theoretical Net.
, Guangyuan Liu
, Yuhui Qiu
: Applications of Particle Swarm Optimization and K-Nearest Neighbors to Emotion Recognition from Physiological Signals.
, Li Li
: An Improved MCPSO with Center Communication.
Intelligent and Fuzzy Systems
, Junli Wang
, Huapu Lu
: A Study on Urban Traffic Congestion Dynamic Predict Method Based on Advanced Fuzzy Clustering Model.
Data Mining and Knowledge Discovery
: An New Algorithm of Association Rule Mining.
, Yue-Jin Lv
: Optimize Algorithm of Decision Tree Based on Rough Sets Hierarchical Attributes.
Neural Networks and Distributed Systems
, Ben Niu
: Designing Artificial Neural Networks Using MCPSO and BPSO.
, Yanli Li
, Li Zhu
: The Comparative Research of Solving Problems of Equilibrium and Optimizing Multi-Resources with GA and PSO.
, Xin Tian
: A Hybrid Evolution Genetic Algorithm for Constrained Optimization.
: Study on Multi-Object Optimization of Logistics Network Based on Genetic Algorithm.
: Multi-Direction Searching Ant Colony Optimization for Traveling Salesman Problems.
, Guilin Zhang
: CFAR Method Based on Half Side Gaussian Model for Small Target Detection.
: Hybrid Abnormal Patterns Recognition of Control Chart Using Support Vector Machining.
Information and Data Security
, Qi Wu
: Study of Linearly Cross-Coupled Chaotic Systems for a Random Bit Generator.
Cryptography, Coding, Security, and Key Management
, Gang Li
, Xiangjun Xin
: Digital Signature Scheme with a (t, l) Threshold Subliminal Channel Based on RSA Signature Scheme.
, Lixin Yu
: A Systematic (48, 32) Code for Correcting Double Errors and Detecting Random Triple Errors.
Steganography, Watermarking, Authentication, and Authorization
Network and Wireless Communication Security
, Clive Boughton
: Analysis, Specification and Modeling of Non-Functional Requirements for Translative Model-Driven Development.
, Xuandong Xiong
: Research on Certificate Cooperating Signature Scheme in Mobile Ad Hoc Networks.
Web Security and Data Management
, Wei Sun
: Short-Term Load Forecasting Based on Rough Set and Wavelet Neural Network.
, Yuping Wang
: Security-Driven Task Scheduling Based on Evolutionary Algorithm.
Anti-Virus and Biometrics