Evolutionary Multiobjective Optimization -- Recent Trends in Evolutionary Multiobjective Optimization -- Self-adaptation and Convergence of Multiobjective Evolutionary Algorithms in Continuous Search Spaces -- A Simple Approach to Evolutionary Multiobjective Optimization -- Quad-trees: A Data Structure for Storing Pareto Sets in Multiobjective Evolutionary Algorithms with Elitism -- Scalable Te…
On Convex Developments of a Doubly-Covered Square -- Flat 2-Foldings of Convex Polygons -- Uniform Coverings of 2-Paths with 6-Paths in the Complete Graph -- Foldings of Regular Polygons to Convex Polyhedra I: Equilateral Triangles -- Maximum Induced Matchings of Random Regular Graphs -- Antimagic Valuations for the Special Class of Plane Graphs -- A General Framework for Coloring Problems: Old…
CAPTCHAs and Performance Analysis -- Building Segmentation Based Human-Friendly Human Interaction Proofs (HIPs) -- A Highly Legible CAPTCHA That Resists Segmentation Attacks -- Visual CAPTCHA with Handwritten Image Analysis -- Characters or Faces: A User Study on Ease of Use for HIPs -- HIP Architectures -- Collaborative Filtering CAPTCHAs -- CAPTCHA Generation as a Web Service -- Leveraging th…
Web Services and Management -- Overview of Web Services -- Application Management and Web Services -- Enterprise Management and Web Services -- Perspectives on Web Services Management -- Managing Web Services From an E-Business Perspective -- Managing Applications and It Infrastructure of Web Services -- The Practice of Web Services Management -- Instrumentation of Web Services -- Managing Comp…
Man-Machine Interface for Intuitive Knowledge Access -- Do Knowledge Assets Really Exist in the World and Can We Access Such Knowledge? -- Benefits of Subjunctive Interface Support for Exploratory Access to Online Resources -- Eye Movement Navigation Interface Supporting Reading -- Intuitive Interfaces for Motion Generation and Search -- IntelligentPad / Meme Media -- Human-Agent Co-operation i…
Computer Security and Intrusion Detection -- Alert Correlation -- Alert Collection -- Alert Aggregation and Verification -- High-Level Alert Structures -- Large-Scale Correlation -- Evaluation -- Open Issues -- Conclusions.INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts pro…
Recent Developments in Equilibria Algorithms -- Partially-Specified Large Games -- Exchange Market Equilibria with Leontief’s Utility: Freedom of Pricing Leads to Rationality -- A Primal-Dual Algorithm for Computing Fisher Equilibrium in the Absence of Gross Substitutability Property -- Click Fraud Resistant Methods for Learning Click-Through Rates -- Experiments with an Economic Model of the…
Invited Lectures -- Hypertree Decompositions: Structure, Algorithms, and Applications -- Combinatorial Search on Graphs Motivated by Bioinformatics Applications: A Brief Survey -- Regular Papers -- Domination Search on Graphs with Low Dominating-Target-Number -- Fully Dynamic Algorithm for Recognition and Modular Decomposition of Permutation Graphs -- Approximating Rank-Width and Clique-Width Q…
Fuzzy Theory and Models -- Uncertainty Management in Data Mining -- Uncertainty Management and Probabilistic Methods in Data Mining -- Approximate Reasoning -- Axiomatic Foundation -- Fuzzy Classifiers -- Fuzzy Clustering -- Fuzzy Database Mining and Information Retrieval -- Information Fusion -- Neuro-Fuzzy Systems -- Fuzzy Control -- Fuzzy Hardware -- Knowledge Visualization and Exploration -…
Research Overview and Technologies for Internet Security -- Impacts of TEI on SMEs -- Risk Assessment of TEI on TEISME -- Methodology -- Analysis of Results -- Critical Evaluation and Discussion -- Conclusion.The explosive popularity of the Internet as a business tool has created a new type of economy, which is called Technology-Enabled Information Economy (TEI). Impacts and Risk Assessment of …