Computational Intelligence and Security

International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings Part I

  • Yue Hao
  • Jiming Liu
  • Yuping Wang
  • Yiu-ming Cheung
  • Hujun Yin
  • Licheng Jiao
  • Jianfeng Ma
  • Yong-Chang Jiao
Conference proceedings CIS 2005

DOI: 10.1007/11596448

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3801)

Table of contents (165 papers)

  1. Front Matter
  2. Learning and Fuzzy Systems

    1. Improving the Scalability of Automatic Programming
      Henrik Berg, Roland Olsson
      Pages 17-24
    2. An Improved Bayesian Network Learning Algorithm Based on Dependency Analysis
      Fengzhan Tian, Shengfeng Tian, Jian Yu, Houkuan Huang
      Pages 33-40
    3. Mining Common Patterns on Graphs
      Ivan Olmos, Jesus A. Gonzalez, Mauricio Osorio
      Pages 41-48
    4. Moderated Innovations in Self-poised Ensemble Learning
      Ricardo Ñanculef, Carlos Valle, Héctor Allende, Claudio Moraga
      Pages 49-56
    5. An Adaptive Framework for Solving Multiple Hard Problems Under Time Constraints
      Sandip Aine, Rajeev Kumar, P. P. Chakrabarti
      Pages 57-64
    6. Multimodal FeedForward Self-organizing Maps
      Andrew P. Papliński, Lennart Gustafsson
      Pages 81-88
    7. Fuzzy QoS Controllers in Diff-Serv Scheduler Using Genetic Algorithms
      Baolin Sun, Qiu Yang, Jun Ma, Hua Chen
      Pages 101-106
    8. Neural Network Based Algorithms for Diagnosis and Classification of Breast Cancer Tumor
      In-Sung Jung, Devinder Thapa, Gi-Nam Wang
      Pages 107-114
    9. A TFN-Based AHP Model for Solving Group Decision-Making Problems
      Jian Cao, Gengui Zhou, Feng Ye
      Pages 121-126
    10. A Tactics for Robot Soccer with Fuzzy Logic Mediator
      Jeongjun Lee, Dongmin Ji, Wonchang Lee, Geuntaek Kang, Moon G. Joo
      Pages 127-132
    11. Gait Control for Biped Robot Using Fuzzy Wavelet Neural Network
      Pengfei Liu, Jiuqiang Han
      Pages 133-138

Other volumes

  1. Computational Intelligence and Security
    International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings Part I
  2. Computational Intelligence and Security
    International Conference, CIS 2005, Xi’an, China, December 15-19, 2005, Proceedings, Part II

About these proceedings

Keywords

Alignment bio-inspried computation biomechanics computational intelligence cryptographic protocols data mining e-learning fuzzy systems genetic programming image processing logic model checking multi-agent system programming proving

Editors and affiliations

  • Yue Hao
    • 1
  • Jiming Liu
    • 2
  • Yuping Wang
    • 3
  • Yiu-ming Cheung
    • 4
  • Hujun Yin
    • 5
  • Licheng Jiao
    • 6
  • Jianfeng Ma
    • 7
  • Yong-Chang Jiao
    • 8
  1. 1.Microelectronic InstiuteXidian UniversityXi’anChina
  2. 2.Department of Computer ScienceHong Kong Baptist UniversityKowloon TongHong Kong
  3. 3.School of Computer Science and TechnologyXidian UniversityXi’anChina
  4. 4.Department of Computer ScienceHong Kong Baptist UniversityHong Kong 
  5. 5.School of Electrical and Electronic EngineeringUniversity of ManchesterUK
  6. 6.Life Science Research Center, School of Electronic EngineeringXidian UniversityXi’anChina
  7. 7.Key Laboratory of Computer Networks and Information Security (Ministry of Education)Xidian UniversityXi’anChina
  8. 8.National Laboratory of Antennas and Microwave TechnologyXidian UniversityXi’anP.R. China

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-30818-8
  • Online ISBN 978-3-540-31599-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349