Invited Speakers -- Computer Networks -- Sensor and Satellite Networks -- Security and Cryptography -- Performance Evaluation -- E-Commerce and Web Services -- Multiagent Systems -- Machine Learning -- Information Retrieval and Natural Language Processing -- Image and Speech Processing -- Algorithms and Database Systems -- Theory of Computing -- Epilogue.
Information Systems and Information Technologies (ISIT) Workshop -- Mobile Communications (Mobicomm) Workshop -- Authentication Authorization Accounting (AAA) Workshop -- Computational Geometry and Applications (CGA’05) Workshop -- Virtual Reality in Scientific Applications and Learning (VRSAL 2005) Workshop -- Molecular Structures and Processes Workshop -- Pattern Recognition and Ubiquitous …
Genomics and Proteomics -- Adaptation and Decision Making -- Applications and Hardware -- Other Applications.The International Conference on Intelligent Computing (ICIC) was set up as an annual forum dedicated to emerging and challenging topics in the various aspects of advances in computational intelligence fields, such as artificial intelligence, machine learning, bioinformatics, and computat…
Perceptual and Pattern Recognition -- Informatics Theories and Applications -- Computational Neuroscience and Bioscience -- Models and Methods -- Learning Systems.The International Conference on Intelligent Computing (ICIC) was set up as an annual forum dedicated to emerging and challenging topics in the various aspects of advances in computational intelligence fields, such as artificial intell…
Introduction: New Directions in Cognitive Information Retrieval -- CIR Concepts -- Interactive Information Retrieval: Bringing the User to a Selection State -- Cognitive Overlaps along the Polyrepresentation Continuum -- Integration Approaches to Relevance -- New Cognitive Directions -- CIR Processes -- A Multitasking Framework for Cognitive Information Retrieval -- Explanation in Information S…
Overview -- Managing Threats to Web Databases and Cyber Systems -- Intrusion Detection: A Survey -- Data Mining Based Analysis of Computer Attacks -- Learning Rules and Clusters for Anomaly Detection in Network Traffic -- Statistical Causality Analysis of Infosec Alert Data -- Understanding Network Security Data: Using Aggregation, Anomaly Detection, and Cluster Analysis for Summarization -- Te…
Cryptography and Coding -- Cryptographic Protocols -- Intrusion Detection -- Security Models and Architecture -- Security Management -- Watermarking and Information Hiding -- Web and Network Applications -- Image and Signal Processing -- Applications.
Introducing .NET Remoting -- Remoting Basics -- Custom Remoting -- Configuration and Deployment -- Asynchronous Remoting -- Debugging and Error Handling -- Flexible Programming -- Examining Assemblies, Objects, and Types -- Using Objects -- Creating Objects -- Attributes -- The .NET Component Model -- Defining Threads -- Threading in .NET -- Working with Threads -- Threading Models -- Scaling T…
From the contents: Design Principles of Plastic Containing Metal Corrosion Inhibitors -- Underlying Notions -- Corrosion Processes in Metal-Polymer Contacts -- Components of Inhibited Plastics -- Thermodynamic and Process Compatibility of the Components of Inhibited Plastics -- Manufacturing Methodology of Inhibited Plastics -- Estimation Procedures of Inhibited Plastics Efficiency -- Designati…