Chapter 1. Introduction (Xinyue Ye) -- Chapter 2. Planning as Computational Intelligence (Shih-Kung Lai) -- Chapter 3. Towards a Spatio-Socio-Semantic Analysis Framework (Wei Luo) -- Chapter 4. Hub location and network design with considerations of flow delay and point-point connection (Guoqiang Shen) -- Chapter 5. Spatial Characteristics of Social Networks (Lingqian Hu) -- Chapter 6. A social …
Overview -- Static Traffic Grooming -- A General Graph Model -- Dynamic Traffic Grooming -- Grooming Switch Architectures -- Sparse Grooming Network -- Network Design with OXCS of Different Bandwidth Granularities -- Traffic Grooming in Next-Generation SONET/SDH.Traffic Grooming in Optical WDM Mesh Networks captures the state-of-the-art in the design and analysis of network architectures, proto…
Cryptography and Coding -- Cryptographic Protocols -- Intrusion Detection -- Security Models and Architecture -- Security Management -- Watermarking and Information Hiding -- Web and Network Applications -- Image and Signal Processing -- Applications.
Long Papers -- Short Papers -- Extended Abstracts for Posters and Demos -- Infrastructure Protection and Emergency Response -- Surveillance, Border Protection, and Transportation Systems.Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applic…
Learning and Fuzzy Systems -- Evolutionary Computation -- Intelligent Agents and Systems -- Intelligent Information Retrieval -- Support Vector Machine -- Swarm Intelligence -- Data Mining -- Pattern Recognition -- Applications.