Schlagwort(e):
Distributed artificial intelligence.
;
Electronic books.
Materialart:
Online-Ressource
Seiten:
1 online resource (197 pages)
Ausgabe:
1st ed.
ISBN:
9783662490174
Serie:
Lecture Notes in Computer Science Series ; v.9380
URL:
https://ebookcentral.proquest.com/lib/geomar/detail.action?docID=5610447
DDC:
006.3
Sprache:
Englisch
Anmerkung:
Intro -- Preface -- Transactions on Computational Collective Intelligence -- Contents -- Management and Computer Science Synergies: A Theoretical Framework for Context Sensitive Simulation Environment -- 1 Introduction -- 2 The Proposition of a Theoretical Model -- 2.1 A Review of the Literature -- 2.2 The Model and Research Hypotheses -- 3 Hypotheses Validation Methodology of the Proposed Model: SEM -- 4 Methodology to Build Context Sensitive Simulation Environment: Fuzzy Data Analysis -- 4.1 Fuzzy Clustering -- 4.2 Fuzzy Rules Extraction -- 5 The Simulation Environment -- 6 Related Works -- 7 Conclusions and Future Works -- References -- Improved Recommendation System Using Friend Relationship in SNS -- Abstract -- 1 Introduction -- 2 Recommended Types of Social Networks -- 2.1 The Representation and the Characteristics of Social Network Data -- 2.2 Recommended Items Based on Social Networks -- 2.3 Recommend of SNS Friends -- 3 Improved Recommendation of SNS Friends: Matrix Decomposition Model on Context -- 3.1 The Introduction of Matrix Decomposition Model -- 3.2 Improved Model -- 4 Experiment and Analysis -- 4.1 A Set of Training Data -- 4.2 Evaluation Standards -- 4.3 The Results of Experiment -- 5 Summary -- References -- Bidirectional Analysis Method of Static XSS Defect Detection Technique Based On Database Query Language -- 1 Introduction -- 2 Reverse XSS Defect Detection Theory -- 2.1 Domains of XSS Defect Description -- 2.2 Relations of XSS Defect Detection -- 2.3 Reverse Semantic Analysis Rules of XSS Defect Detection -- 2.4 Bidirectional Taint Propagation Analysis Approach -- 3 Implementation of Reverse Static Detection on XSS Defect -- 3.1 Pre-processing Program -- 3.2 Call Information Analysis of the Source Code -- 3.3 Program Information Analysis -- 3.4 Defect Rules Matching Analysis -- 4 The Results and Analysis of Experiments.
,
4.1 Comparing Results of Forward Analysis, Reverse Analysis and Bidirectional Analysis -- 5 Conclusion and Future Work -- References -- A Multilevel Security Model for Search Engine Over Integrated Data -- 1 Introduction -- 2 Related Work -- 2.1 Data Integration and Secure Search -- 2.2 Multi Level Security -- 2.3 Integration of Security Policies -- 3 Scenarios and Systems -- 3.1 Search Systems -- 3.2 The Integration Architecture -- 3.3 Formal Model -- 4 Access Policy Integration -- 4.1 Integration Sequence -- 4.2 Lattice Integration -- 4.3 Mapping Function Translation -- 4.4 Matrix Integration -- 5 Security Analysis and Proof -- 6 Conclusions -- 6.1 Work Summary -- 6.2 Contributions -- 6.3 Future Work -- References -- Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Organization -- 2 Review of a Multi-use CCA-secure IBPRE Scheme -- 2.1 Definition and Security Model -- 2.2 The Wang et al.'s IBPRE Scheme -- 3 Our Attack -- 3.1 Attack I -- 3.2 Attack II -- 3.3 On Collusion Resistance -- 4 Review of Another IBPRE Scheme -- 4.1 Definition of Single-Hop Unidirectional IBPRE -- 4.2 Security Model for Single-Hop Unidirectional IBPRE -- 4.3 Luo et al.'s IBPRE Scheme -- 5 Security Analysis -- 5.1 Attack by Using the Insecure ReKeyGen Algorithm -- 5.2 On the Transitivity Property -- 6 Conclusion -- References -- Enabling Vehicular Data with Distributed Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Application of ML Algorithms on Traffic Data -- 4 Distributing k-Nearest Neighbors -- 5 Discussion -- 6 Conclusion -- References -- Adapting Distributed Evolutionary Algorithms to Heterogeneous Hardware -- 1 Introduction -- 2 Background -- 3 The HAPA Methodology -- 4 Experimental Setup -- 4.1 The Knapsack Problem -- 4.2 Parameters.
,
5 HAPA Phase 1: Know Your Platform -- 5.1 Hardware Description -- 5.2 Ranking Using Standard Benchmark Software -- 5.3 Ranking Using Traditional dGAs -- 5.4 Mathematical Approximation of Running Times -- 6 HAPA Phase 2: Design Your Algorithm -- 6.1 DGA_HAPA: A First Algorithm Derived from HAPA -- 6.2 DGA_HAPA-FM: A Second dGA Derived from HAPA -- 7 HAPA Phase 3: Obtaining the Results -- 7.1 Hit Rate Analysis -- 7.2 Numerical Effort Analysis -- 7.3 Runtime Analysis -- 7.4 Search Diversity Analysis -- 8 Conclusions and Future Research -- References -- Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles -- 1 Introduction -- 1.1 5G Telecommunication Network and Autonomous Vehicle System -- 1.2 Attribute Based Encryption for Sharing Real-Time Traffic Information -- 1.3 Motivation and Contribution -- 1.4 Organization -- 2 Definition and Security Model for KP-ABE-SR -- 3 A Concrete KP-ABE-RS Scheme and Its Security Analysis -- 3.1 Access Tree -- 3.2 The Concrete KP-ABE-RS Scheme -- 3.3 Security Proof -- 4 The Eroca System -- 5 Performance Evaluation -- 6 Conclusion -- References -- Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud -- 1 Introduction -- 1.1 Related Works -- 1.2 Key Problems -- 1.3 Contributions -- 2 Preliminaries -- 2.1 Broadcast Encryption -- 2.2 Single-User Searchable Encryption -- 2.3 Multi-user Searchable Encryption -- 3 System Model -- 3.1 Basic Model -- 3.2 Data Flows -- 3.3 Coarse-Grained Access Control -- 4 Multi-user Searchable Encryption for Data Sharing -- 4.1 Our Construction -- 4.2 Security Analysis -- 4.3 Comparison -- 5 Implementation -- 5.1 Access Control Implementation -- 5.2 SUSE Scheme Supporting Two-Phase Operation -- 6 Conclusion -- References -- Quantum Information Splitting Based on Entangled States -- 1 Introduction -- 2 Preliminary.
,
2.1 For the First MQIS Protocol -- 2.2 For the Second QIS Protocol -- 3 MQIS Protocol Based on ES of Bell States -- 3.1 (2,2) Protocol -- 3.2 (3,3) Protocol -- 3.3 (n,n) Protocol -- 4 QIS Protocol Based on Four-Particle Cluster States -- 5 Protocol Analysis -- 5.1 Security Analysis -- 5.2 Efficiency Analysis -- 6 Conclusion -- References -- Zero-Tree Wavelet Algorithm Joint with Huffman Encoding for Image Compression -- 1 Introduction -- 2 Description of EZW Algorithm -- 3 The Analysis of EZW Performance -- 4 EZW Joint with Huffman Coding Scheme -- 4.1 The Thought of Joint Coding -- 4.2 Joint Coding Simulation Results and Performance Analysis -- 5 Conclusions -- References -- Author Index.