feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Online Resource  (16)
  • UB Potsdam  (16)
  • SLB Potsdam
  • SB Ludwigsfelde
  • Staatliche Museen
  • Computer Science  (16)
Type of Medium
  • Online Resource  (16)
  • Book  (13)
Language
Region
Library
Access
  • 1
    UID:
    almahu_9947411615302882
    Format: XI, 415 p. 112 illus. , online resource.
    ISBN: 9783319725987
    Series Statement: Lecture Notes in Computer Science, 10717
    Content: This book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017. The 17 revised full papers and 7 short papers presented together with 2 invited papers were carefully reviewed and selected from 73 submissions. The papers address the following topics:  privacy/cryptography, systems security, security analysis, identity management and access control, security attacks and detection, network security.
    Note: Privacy/cryptography -- Systems security -- Security analysis -- Identity management and access control -- Security attacks and detection -- Network security.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783319725970
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9947363870402882
    Format: XVI, 862 p. 267 illus. , online resource.
    ISBN: 9783319135632
    Series Statement: Lecture Notes in Computer Science, 8886
    Content: This volume constitutes the proceedings of the 10th International Conference on Simulated Evolution and Learning, SEAL 2012, held in Dunedin, New Zealand, in December 2014. The 42 full papers and 29 short papers presented were carefully reviewed and selected from 109 submissions. The papers are organized in topical sections on evolutionary optimization; evolutionary multi-objective optimization; evolutionary machine learning; theoretical developments; evolutionary feature reduction; evolutionary scheduling and combinatorial optimization; real world applications and evolutionary image analysis.
    Note: Evolutionary optimization -- Evolutionary multi-objective optimization -- Evolutionary machine learning -- Theoretical developments -- Evolutionary feature reduction -- Evolutionary scheduling and combinatorial optimization -- Real world applications and evolutionary image analysis.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783319135625
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9947920563102882
    Format: X, 242 p. , online resource.
    ISBN: 9783540366096
    Series Statement: Lecture Notes in Computer Science, Lecture Notes in Artificial Intelligence, 2631
    Note: How Human Trusters Assess Trustworthiness in Quasi-virtual Contexts -- Challenges for Trust, Fraud and Deception Research in Multi-agent Systems -- Designing for Trust -- The Epistemic Role of Trust -- Trustworthy Service Composition: Challenges and Research Questions -- A Service-Oriented Trust Management Framework -- A Fuzzy Approach to a Belief-Based Trust Computation -- Annotating Cooperative Plans with Trusted Agents -- Supervised Interaction — A Form of Contract Management to Create Trust between Agents -- Evaluating Reputation in Multi-agents Systems -- Towards Incentive-Compatible Reputation Management -- Securing Agent-Based e-Banking Services -- Specifying Standard Security Mechanisms in Multi-agent Systems -- A Trusted Method for Self-profiling in e-Commerce -- A Practical Study on Security of Agent-Based Ubiquitous Computing -- Designing for Privacy in a Multi-agent World -- Soft Security: Isolating Unreliable Agents from Society.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540009887
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    gbv_595125417
    Format: Online-Ressource (XXIII, 168 S.)
    Edition: Online-Ausg. Berlin [u.a.] Springer 2006 Springer lecture notes archive
    ISBN: 9783540484189
    Series Statement: Lecture notes in computer science 799
    Content: Multiagent systems -- Technical framework -- Intentions -- Know-how -- Combining intentions and know-how -- Communications -- Conclusions and future work.
    Content: Distributed computing is of great significance in current and future reserach and applications of computer science. As a consequence, in artificial intelligence we can observe rapid growth in the subfield of distributed artificial intelligence (DAI). In particular research on multiagent systems and their potential applications currently attract a lot of interest. This monograph presents recent research and an introductory survey on multiagent systems and some other aspects of DAI. The author describes these systems as composed of intelligent entities, the agents, with intentions, beliefs, know-how, and communicating with each other, furthermore, a semantics for multiagent systems in a general logical framework is developed.
    Note: Zugl.: Austin, Texas, Univ., Diss.
    Additional Edition: ISBN 3540580263
    Additional Edition: ISBN 9783540580263
    Additional Edition: Erscheint auch als Druck-Ausgabe Singh, Munindar P., 1964 - Multiagent systems Berlin : Springer, 1994 ISBN 3540580263
    Additional Edition: ISBN 0387580263
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    RVK:
    Keywords: Verteiltes System ; Agent ; Alltagswissen ; Hochschulschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    b3kat_BV048975454
    Format: 1 Online-Ressource
    Edition: 4th Edition
    ISBN: 9781292055763
    Content: For one or two-semester courses in Microprocessors or Intel 16-32 Bit Chips. Future designers of microprocessor-based electronic equipment need a systems-level understanding of the 80x86 microcomputer. This text offers thorough, balanced, and practical coverage of both software and hardware topics. Basic concepts are developed using the 8088 and 8086 microprocessors, but the 32-bit versions of the 80x86 family are also discussed. The authors examine how to assemble, run, and debug programs, and how to build, test, and troubleshoot interface circuits
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781292040608
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Mikroprozessor 8088 ; Mikroprozessor 8086
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9947364102202882
    Format: XII, 205 p. , online resource.
    ISBN: 9783540258407
    Series Statement: Lecture Notes in Computer Science, 2872
    Content: Peer-to-peer (P2P) computing is currently attracting enormous public attention, spurred by the popularity of file-sharing systems such as Napster, Gnutella, Morpheus, Kaza, and several others. In P2P systems, a very large number of autonomous computing nodes, the peers, rely on each other for services. P2P networks are emerging as a new distributed computing paradigm because of their potential to harness the computing power and the storage capacity of the hosts composing the network, and because they realize a completely open decentralized environment where everybody can join in autonomously. Although researchers working on distributed computing, multiagent systems, databases, and networks have been using similar concepts for a long time, it is only recently that papers motivated by the current P2P paradigm have started appearing in high quality conferences and workshops. In particular, research on agent systems appears to be most relevant because multiagent systems have always been thought of as networks of autonomous peers since their inception. Agents, which can be superimposed on the P2P architecture, embody the description of task environments, decision-support capabilities, social behaviors, trust and reputation, and interaction protocols among peers. The emphasis on decentralization, autonomy, ease, and speed of growth that gives P2P its advantages also leads to significant potential problems. Most prominent among these are coordination – the ability of an agent to make decisions on its own actions in the context of activities of other agents, and scalability – the value of the P2P systems in how well they self-organize so as to scale along several dimensions, including complexity, heterogeneity of peers, robustness, traffic redistribution, etc. This book brings together an introduction, three invited articles, and revised versions of the papers presented at the Second International Workshop on Agents and Peer-to-Peer Computing, AP2PC 2003, held in Melbourne, Australia, July 2003.
    Note: Paradigm Integration and Challenges -- Information Acquisition Through an Integrated Paradigm: Agent + Peer-to-Peer -- Robustness Challenges in Peer-to-Peer Agent Systems -- Trust -- Bayesian Network Trust Model in Peer-to-Peer Networks -- Agent-Based Social Assessment of Shared Resources -- A Passport-Like Service over an Agent-Based Peer-to-Peer Network -- Self-Organization -- A Robust and Scalable Peer-to-Peer Gossiping Protocol -- Group Formation Among Peer-to-Peer Agents: Learning Group Characteristics -- A Pheromone-Based Coordination Mechanism Applied in Peer-to-Peer -- Incentives -- Incentive Mechanisms for Peer-to-Peer Systems -- A Taxonomy of Incentive Patterns -- Search and Systems -- P2P MetaData Search Layers -- A Peer-to-Peer Information System for the Semantic Web -- G-Grid: A Class of Scalable and Self-Organizing Data Structures for Multi-dimensional Querying and Content Routing in P2P Networks -- Fuzzy Cost Modeling for Peer-to-Peer Systems -- A P2P Approach to ClassLoading in Java -- Adaptive Applications -- Multi-agent Interaction Technology for Peer-to-Peer Computing in Electronic Trading Environments -- Location-Based and Content-Based Information Access in Mobile Peer-to-Peer Computing: The TOTA Approach -- K-Trek: A Peer-to-Peer Approach to Distribute Knowledge in Large Environments -- Mobile Agents -- Improving Peer-to-Peer Resource Discovery Using Mobile Agent Based Referrals -- Mobile Agents for Locating Documents in Ad Hoc Networks.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540240532
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    gbv_1698811683
    Format: 1 Online-Ressource (XIV, 216 Seiten) , Diagramme
    ISBN: 9783110628616 , 9783110625714
    Series Statement: De Gruyter series on the applications of mathematics in engineering and information sciences volume 1
    Content: Soft computing is used where a complex problem is not adequately specified for the use of conventional math and computer techniques. Soft computing has numerous real-world applications in domestic, commercial and industrial situations. This book elaborates on the most recent applications in various fields of engineering.
    Note: Erscheint Open Access. This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC-BY-NC-ND)
    Additional Edition: ISBN 9783110625608
    Additional Edition: Erscheint auch als Druckausgabe Soft computing Berlin : De Gruyter, 2020 ISBN 9783110625608
    Additional Edition: ISBN 3110625601
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Soft Computing ; Automatisierungstechnik ; Neuronales Netz ; Fuzzy-Logik ; Aufsatzsammlung
    URL: Cover
    URL: Cover
    Author information: Ram, Mangey 1980-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    gbv_1649235550
    Format: Online-Ressource (XII, 205 p. Also available online, digital)
    ISBN: 9783540258407
    Series Statement: Lecture Notes in Computer Science, Lecture Notes in Artificial Intelligence 2872
    Content: Paradigm Integration and Challenges -- Information Acquisition Through an Integrated Paradigm: Agent + Peer-to-Peer -- Robustness Challenges in Peer-to-Peer Agent Systems -- Trust -- Bayesian Network Trust Model in Peer-to-Peer Networks -- Agent-Based Social Assessment of Shared Resources -- A Passport-Like Service over an Agent-Based Peer-to-Peer Network -- Self-Organization -- A Robust and Scalable Peer-to-Peer Gossiping Protocol -- Group Formation Among Peer-to-Peer Agents: Learning Group Characteristics -- A Pheromone-Based Coordination Mechanism Applied in Peer-to-Peer -- Incentives -- Incentive Mechanisms for Peer-to-Peer Systems -- A Taxonomy of Incentive Patterns -- Search and Systems -- P2P MetaData Search Layers -- A Peer-to-Peer Information System for the Semantic Web -- G-Grid: A Class of Scalable and Self-Organizing Data Structures for Multi-dimensional Querying and Content Routing in P2P Networks -- Fuzzy Cost Modeling for Peer-to-Peer Systems -- A P2P Approach to ClassLoading in Java -- Adaptive Applications -- Multi-agent Interaction Technology for Peer-to-Peer Computing in Electronic Trading Environments -- Location-Based and Content-Based Information Access in Mobile Peer-to-Peer Computing: The TOTA Approach -- K-Trek: A Peer-to-Peer Approach to Distribute Knowledge in Large Environments -- Mobile Agents -- Improving Peer-to-Peer Resource Discovery Using Mobile Agent Based Referrals -- Mobile Agents for Locating Documents in Ad Hoc Networks.
    Content: Peer-to-peer (P2P) computing is currently attracting enormous public attention, spurred by the popularity of file-sharing systems such as Napster, Gnutella, Morpheus, Kaza, and several others. In P2P systems, a very large number of autonomous computing nodes, the peers, rely on each other for services. P2P networks are emerging as a new distributed computing paradigm because of their potential to harness the computing power and the storage capacity of the hosts composing the network, and because they realize a completely open decentralized environment where everybody can join in autonomously. Although researchers working on distributed computing, multiagent systems, databases, and networks have been using similar concepts for a long time, it is only recently that papers motivated by the current P2P paradigm have started appearing in high quality conferences and workshops. In particular, research on agent systems appears to be most relevant because multiagent systems have always been thought of as networks of autonomous peers since their inception. Agents, which can be superimposed on the P2P architecture, embody the description of task environments, decision-support capabilities, social behaviors, trust and reputation, and interaction protocols among peers. The emphasis on decentralization, autonomy, ease, and speed of growth that gives P2P its advantages also leads to significant potential problems. Most prominent among these are coordination – the ability of an agent to make decisions on its own actions in the context of activities of other agents, and scalability – the value of the P2P systems in how well they self-organize so as to scale along several dimensions, including complexity, heterogeneity of peers, robustness, traffic redistribution, etc. This book brings together an introduction, three invited articles, and revised versions of the papers presented at the Second International Workshop on Agents and Peer-to-Peer Computing, AP2PC 2003, held in Melbourne, Australia, July 2003.
    Additional Edition: ISBN 9783540240532
    Additional Edition: Buchausg. u.d.T. Agents and peer-to-peer computing Berlin : Springer, 2004 ISBN 3540240535
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Peer-to-Peer-Netz ; Mehragentensystem ; Autonomer Agent ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    gbv_626360153
    Format: Online-Ressource
    ISBN: 9783540447320
    Series Statement: Lecture Notes in Computer Science 2013
    Additional Edition: Buchausg. u.d.T.: 2, 2001, Rio de Janeiro Advances in pattern recognition - ICAPR 2001
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Mustererkennung ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg
    UID:
    gbv_626361869
    Format: Online-Ressource
    ISBN: 9783540455479
    Series Statement: Lecture Notes in Computer Science 2246
    Additional Edition: Buchausg. u.d.T.: Trust in cyber societies
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Mensch-Maschine-Kommunikation ; Mehragentensystem ; Cyberspace ; Benutzerorientierung ; Aufsatzsammlung ; Aufsatzsammlung ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages