Invited Contributions -- Towards a Unified Model for Web Services Composition -- Peer-to-Peer Data Integration with Active XML -- Query Incentive Networks -- Database and Information Retrieval Techniques for XML -- Regular Contributions -- Implementing a Tamper-Evident Database System -- Ontology Engineering from a Database Perspective -- Retracted: Shared Ontology for Pervasive Computing -- Pr…
Keynote Papers -- Counting by Coin Tossings -- On the Role Definitions in and Beyond Cryptography -- Meme Media for the Knowledge Federation Over the Web and Pervasive Computing Environments -- Contributed Papers -- Probabilistic Space Partitioning in Constraint Logic Programming -- Chi-Square Matrix: An Approach for Building-Block Identification -- Design Exploration Framework Under Imprecisen…
High Performance Computing and Algorithms -- Computer Modeling and Simulations -- Biological and Medical Informatics -- Data and Information Sciences -- Computational Graphics and Visualization.The 2004 International Symposium on Computational and Information Sciences (CIS 2004) aimed at bringing researchers in the area of computational and - formation sciences together to exchange new ideas an…
Database Systems -- Database System Architecture – A Walk Through Time: From Centralized Platform to Mobile Computing – Keynote Address -- Extending Wide-Area Replication Support with Mobility and Improved Recovery -- Extending Databases to Precision-Controlled Retrieval of Qualitative Information -- An Approach for Solving Very Large Scale Instances of the Design Distribution Problem for D…
Full Papers -- Verifying the Incorrectness of Programs and Automata -- Generating Admissible Heuristics by Abstraction for Search in Stochastic Domains -- Synthesizing Plans for Multiple Domains -- Abstract Policy Evaluation for Reactive Agents -- Implementing an Abstraction Framework for Soft Constraints -- Transforming and Refining Abstract Constraint Specifications -- Learning Regular Expres…
to Cryptocomplexity -- Foundations of Computer Science and Mathematics -- Foundations of Complexity Theory -- Foundations of Cryptology -- Hierarchies Based on NP -- Randomized Algorithms and Complexity Classes -- RSA Cryptosystem, Primality, and Factoring -- Other Public-Key Cryptosystems and Protocols.Modern cryptology employs mathematically rigorous concepts and methods from complexity theor…
Security Issues in the Tuple-Space Coordination Model -- Information Flow Analysis for Probabilistic Timed Automata -- Dynamic Security Labels and Noninterference (Extended Abstract) -- Formal Analysis of a Fair Payment Protocol -- Pattern-Matching Spi-Calculus -- Decidability of Opacity with Non-Atomic Keys -- Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards -- Fami…
Knowledge Mining: A Quantitative Synthesis of Research Results and Findings -- An Evidential Approach to Classification Combination for Text Categorisation -- Visualization Techniques for Non Symmetrical Relations -- Understanding Text Mining: A Pragmatic Approach -- Novel Approaches to Unsupervised Clustering Through k-Windows Algorithm -- Semiometric Approach, Qualitative Research and Text Mi…
Introduction to Pattern Recognition with Intelligent Systems -- Type-1 Fuzzy Logic -- Type-2 Fuzzy Logic and Intuitionistic Fuzzy Logic -- Supervised Neural Networks -- Unsupervised Neural Networks -- Modular Neural Networks -- Evolutionary Computing for Architecture Optimization -- Clustering with Intelligent Techniques -- Face Recognition with Modular Neural Networks and Fuzzy Measures -- Fin…
From Genetic Variation to Probabilistic Modeling -- Probabilistic Model-Building Genetic Algorithms -- Bayesian Optimization Algorithm -- Scalability Analysis -- The Challenge of Hierarchical Difficulty -- Hierarchical Bayesian Optimization Algorithm -- Hierarchical BOA in the Real World.This book provides a framework for the design of competent optimization techniques by combining advanced evo…