Feature Selection with Rough Sets for Web Page Classification / Aijun An ; Yanhui Huang ; Xiangji Huang ; Nick Cercone
On Learning Similarity Relations in Fuzzy Case-Based Reasoning / Eva Armengol ; Francesc Esteva ; Lluís Godo ; Vicenç Torra
Incremental versus Non-incremental Rule Induction for Multicriteria Classification / Salvatore Greco ; Roman Slowiński ; Jerzy Stefanowski ; Marcin Zurawski
Three Strategies to Rule Induction from Data with Numerical Attributes / Jerzy W. Grzymala-Busse
Fuzzy Transforms / Irina Perfilieva
Possible Equivalence Relations and Their Application to Hypothesis Generation in Non-deterministic Information Systems / Hiroshi Sakai
Applications of Fuzzy Logic Functions to Knowledge Discovery in Databases / Noboru Takagi ; Hiroaki Kikuchi ; Masao Mukaidono
Fuzzy Integral Based Fuzzy Switching Functions / Eiichiro Takahagi
First Steps Towards Computably-Infinite Information Systems / Peter Apostoli ; Akira Kanda ; Lech Polkowski
Data Structure and Operations for Fuzzy Multisets / Sadaaki Miyamoto
A Non-controversial Definition of Fuzzy Sets / Jaroslav Ramík ; Milan Vlach
Rough Mereology as a Link Between Rough and Fuzzy Set Theories. A Survey
Fuzzy Rough Sets Based on Residuated Lattices / Anna Maria Radzikowska ; Etienne E. Kerre
Semantics of Fuzzy Sets in Rough Set Theory / Yiyu Yao
A New Proposal for Fuzzy Rough Approximations and Gradual Decision Rule Representation / Masahiro Inuiguchi
Emergent Rough Set Data Analysis / Yasser Hassan ; Eiichiro Tazaki
Author Index
Feature Selection with Rough Sets for Web Page Classification / Aijun An ; Yanhui Huang ; Xiangji Huang ; Nick Cercone
On Learning Similarity Relations in Fuzzy Case-Based Reasoning / Eva Armengol ; Francesc Esteva ; Lluís Godo ; Vicenç Torra
Incremental versus Non-incremental Rule Induction for Multicriteria Classification / Salvatore Greco ; Roman Slowiński ; Jerzy Stefanowski ; Marcin Zurawski
Impacts of Security Protocols on Real-Time Multimedia Communications / Kihun Hong ; Souhwan Jung ; Luigi Lo Iacono ; Christoph Ruland
An Improvement on Privacy and Authentication in GSM / Young Jae Choi ; Soon Ja Kim
Encrypted Watermarks and Linux Laptop Security / Markku-Juhani O. Saarinen
Inconsistency Detection of Authorization Policies in Distributed Component Environment / Chang-Joo Moon ; Hoh Peter In
Public Key Schemes I
Custodian-Hiding Verifiable Encryption / Joseph K. Liu ; Victor K. Wei ; Duncan S. Wong
Proving Key Usage / Malek Bechlaghem ; Vincent Rijmen
Public Key Encryption with Conjunctive Field Keyword Search / Dong Jin Park ; Kihyun Kim ; Pil Joong Lee
Intrusion Detection I
A Probabilistic Method for Detecting Anomalous Program Behavior / Kohei Tatara ; Toshihiro Tabata ; Kouichi Sakurai
Service Discrimination and Audit File Reduction for Effective Intrusion Detection / Fernando Godínez ; Dieter Hutter ; Raúl Monroy
IDS False Alarm Filtering Using KNN Classifier / Kwok Ho Law ; Lam For Kwok
Watermarking/Anti-spamming
Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking / Hae-Yeoun Lee ; Jong-Tae Kim ; Heung-Kyu Lee ; Young-Ho Suh
Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment / Manabu Iwanaga
Public Key Schemes II
Efficient Authenticated Key Agreement Protocol for Dynamic Groups / Kui Ren ; Hyunrok Lee ; Kwangjo Kim ; Taewhan Yoo
A Ring Signature Scheme Using Bilinear Pairings / Jing Xu ; Zhenfeng Zhang ; Dengguo Feng
Verifiable Pairing and Its Applications / Sherman S.M. Chow
Intrusion Detection II
Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading / Bart Haagdorens ; Tim Vermeiren ; Marnix Goossens
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks / Seok Bong Jeong ; Young Woo Choi ; Sehun Kim
Application of Content Computing in Honeyfarm / Yi-Yuan Huang ; Kwok-Yan Lam ; Siu-Leung Chung ; Chi-Hung Chi ; Jia-Guang Sun
Digital Rights Management
License Protection with a Tamper-Resistant Token / Cheun Ngen Chong ; Bin Ren ; Jeroen Doumen ; Sandro Etalle ; Pieter H. Hartel ; Ricardo Corin
An Adaptive Approach to Hardware Alteration for Digital Rights Management / Yinyan Yu ; Zhi Tang
Dynamic Fingerprinting over Broadcast Using Revocation Scheme / Mira Kim ; Kazukuni Kobara ; Hideki Imai
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels / Chong Hee Kim ; Yong Ho Hwang
e-Commerce Security
Vulnerability of a Mobile Payment System Proposed at WISA 2002 / Sang Cheol Hwang ; Dong Hoon Lee ; Daewan Han ; Jae-Cheol Ryou
Fair Offline Payment Using Verifiable Encryption / Sangjin Kim ; Heekuck Oh
A Limited-Use Key Generation Scheme for Internet Transactions / Supakorn Kungpisdan ; Phu Dung Le ; Bala Srinivasan
Efficient Implementation
Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes / Kishan Chand Gupta ; Palash Sarkar
Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(qn) Using a Gaussian Normal Basis of Type II / Soonhak Kwon
Hyperelliptic Curve Coprocessors on a FPGA / HoWon Kim ; Thomas Wollinger ; YongJe Choi ; KyoIl Chung ; Christof Paar
Anonymous Communication
Key-Exchange Protocol Using Pre-agreed Session-ID / Kenji Imamoto
A New k-Anonymous Message Transmission Protocol / Gang Yao
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack / Marcin Gomulkiewicz ; Marek Klonowski ; Mirosław Kutyłowski
Side-Channel Attacks
Side Channel Cryptanalysis on SEED / HyungSo Yoo ; ChangKyun Kim ; JaeCheol Ha ; SangJae Moon ; IlHwan Park
Secure and Efficient AES Software Implementation for Smart Cards / Elena Trichina ; Lesya Korkishko
Practical Template Attacks / Christian Rechberger ; Elisabeth Oswald
Evaluation and Improvement of the Tempest Fonts / Hidema Tanaka ; Osamu Takizawa ; Akihiro Yamamura
Author Index
Network/Computer Security
Impacts of Security Protocols on Real-Time Multimedia Communications / Kihun Hong ; Souhwan Jung ; Luigi Lo Iacono ; Christoph Ruland
An Improvement on Privacy and Authentication in GSM / Young Jae Choi ; Soon Ja Kim
A Linear Time Algorithm for Constructing Tree 4-Spanner in 2-Trees / B.S. Panda ; A. Das
Task Scheduling Algorithm for Interconnection Constrained Network of Heterogeneous Processors / E. Ilavarasan ; P. Thambidurai ; N. Punithavathi
Neural Networks
Detecting Topology Preserving Feature Subset with SOM / A. Laha
Adaptive Neural Network-Based Clustering of Yeast Protein-Protein Interactions
Design of Neuro-fuzzy Controller Based on Dynamic Weights Updating / A. Hafez ; A. Alrabie ; A. Agarwal
Interval Computing in Neural Networks: One Layer Interval Neural Networks / R.E. Patiño-Escarcina ; B.R. Callejas Bedregal ; A. Lyra
Communication Networks
Design and Deployment of IP Virtual Private Networks: A Case Study / C. Hota ; G. Raghurama
QoS Driven Online Multicast Routing Algorithm / R. Manoharan ; S. Pradhiba
Software Radio Implementation of a Smart Antenna System on Digital Signal Processors for cdma2000 / K. Kucuk ; M. Karakoc ; A. Kavak
An Efficient Cost Effective Location Management Scheme Based on Velocity Vector Information of Mobile Unit / S. Nandi ; M.K. Raushan
Integrated Computation, Communication and Control: Towards Next Revolution in Information Technology / F. Xia ; Z. Wang ; Y. Sun
Mobile and Adhoc Networks
Designing Mobile Distributed Virtual Memory System / S. Bagchi
Efficient Grid Location Update Scheme for Mobile Ad Hoc Networks / K.A.A. Omer ; D.K. Lobiyal
Power Optimization in Mobile Networks Using Genetic Algorithm to Guarantee QoS / A.H. Salem ; A. Kumar
Associativity Based Mobility-Adaptive K-Clustering in Mobile Ad-Hoc Networks / C. Jayakumar ; C. Chellappan
Self-organized Security Architecture for MANET / P.P. Gnana Durai ; R. Parthasarathy
Clock Synchronization in IEEE 802.11 Ad Hoc Networks / S.S. Thakur ; D. Goswami ; R. Bhattarcharjee
Security
Internet Banking - A Layered Approach to Security / D.P. Dube ; S. Ramanarayanan
On Reduction of Bootstrapping Information Using Digital Multisignature / S. Ulanbek ; A. Saxena ; A. Negi
SpamNet - Spam Detection Using PCA and Neural Networks / A. Lad
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection / V.A. Kumar ; D. Sisalem
Network Intrusion Detection Using Wavelet Analysis / S. Rawat ; C.S. Sastry
Building a Secure and Highly Scalable Data Distribution System / S. Mishra
Database
Performance of Distributed Optimistic Concurrency Control in Real-Time Databases / J. Lindström
An Extension to ER Model for Top-Down Semantic Modeling of Databases of Applications / S.K. Jain ; M.M. Gore ; G. Singh
Overlaying Multiple Maps Efficiently / R. Jampani ; R. Thonangi ; P. Gupta
Software Engineering
Relational Schema Evolution for Program Independency / Y.-G. Ra
Reliability Enhancement in Software Testing - An Agent-Based Approach for Complex Systems / P. Dhavachelvan ; G. V. Uma
MurO: A Multi-representation Ontology as a Foundation of Enterprise Information Systems / R. Rifaieh ; A. Arara ; A.N. Benharkat
A Tool to Automatically Detect Defects in C++ Programs / S. Sarala ; S. Valli
Implementation of Embedded Cores-Based Digital Devices in JBits Java Simulation Environment / M.H. Assaf ; R.S. Abielmona ; P. Abolghasem ; S.R. Das ; E.M. Petriu ; V. Groza ; M. Sahinoglu
Automatic Model Generation in Model Management / A. Boronat ; I. Ramos ; J.Ã. CarsÃ
Signal and Image Processing
Contourlet Based Multiresolution Texture Segmentation Using Contextual Hidden Markov Models / B.S. Raghavendra ; P.S. Bhat
FPGA Based Implementation of an Invisible-Robust Image Watermarking Encoder / S.P. Mohanty ; R. Kumara C. ; S. Nayak
Multi-agent Based User Access Patterned Optimal Content Allocation Method for Federated Video Digital Libraries / R. Ponnusamy ; T.V. Gopal
Optimizing Surplus Harmonics Distribution in PWM / S. Hu ; H. Huang
M-BCJR Based Turbo Equalizer / P. Kumar ; R.M. Banakar ; B. Shankaranand
Internet and WWW-Based Computing
YALXP: Yet Another Lightweight XPath Processor / R.V.R.P. Kumar ; V. Radha
Early Performance Modeling for Web Based Applications / D.E. Geetha ; T.V.S. Kumar ; K.R. Kanth
An Examination of Website Quality Dimensions in Australian e-Retailing: A Confirmatory Factor Analysis Approach / S. Sinnappan ; J. Carlson
Aspects of Pervasive Computing for Web Based Learning / S.R. Balasundaram
Author Index
Computational Intelligence
An Approach for Conceptual Modeling and Extracting Expressive Semantics from Dance Videos / K. Rajkumar ; B. Ramadoss ; K. Ilango
Man-Machine Interface for Intuitive Knowledge Access
Do Knowledge Assets Really Exist in the World and Can We Access Such Knowledge? Knowledge Evolves Through a Cycle of Knowledge Liquidization and Crystallization / Koichi Hori
Benefits of Subjunctive Interface Support for Exploratory Access to Online Resources / Aran Lunzer
Eye Movement Navigation Interface Supporting Reading / Satoru Morita
Intuitive Interfaces for Motion Generation and Search / Yoshihiro Okada ; Hiroaki Etou ; Koichi Niijima
IntelligentPad / Meme Media
Human-Agent Co-operation in Accessing and Communicating Knowledge Media - A Case in Medical Therapy Planning / Volker Dötsch ; Kimihito Ito ; Klaus P. Jantke
Accessing Related Web Resources Through Annotated Documents / Jun Fujima ; Yuzuru Tanaka
The Biotope Issue in Meme Media Implementations
Meme Media Architecture for Intuitively Accessing and Organizing Intellectual Resources
Visualization and Design of Information Access Spaces
Enhancing Visual Perception Using Dynamic Updating of Display / Toshio Kawashima ; Takanori Terashima ; Takeshi Nagasaki ; Masashi Toda
3D Space Framework for the Multi-facet Accessing of Database Records / Makoto Ohigashi
Integrated Visualization Framework for Relational Databases and Web Resources / Tsuyoshi Sugibuchi
Semantic and Narrative Organization and Access of Knowledge Discovering Implicit Relationships in a Web of Contexts / Mina Akaishi ; Nicolas Spyratos
On Information Organization in Annotation Systems / Panos Constantopoulos ; Martin Doerr ; Maria Theodoridou ; Manos Tzobanakis
Modelling Learning Subjects as Relationships
Formalizing Retrieval Goal Change by Prioritized Abduction / Ken Satoh
Similarity of Documents Based on the Vector Sequence Model / Akihiro Yamamoto ; Akira Ogiso
Towards Constructing Story Databases Using Maximal Analogies Between Stories / Masaharu Yoshioka ; Makoto Haraguchi ; Akihito Mizoe
Author Index
Man-Machine Interface for Intuitive Knowledge Access
Do Knowledge Assets Really Exist in the World and Can We Access Such Knowledge? Knowledge Evolves Through a Cycle of Knowledge Liquidization and Crystallization / Koichi Hori
Benefits of Subjunctive Interface Support for Exploratory Access to Online Resources / Aran Lunzer
Digital Media Watermarking: Session Chair / Lisa MarvelSession 1:
An Implementation of, and Attacks on, Zero-Knowledge Watermarking / Scott Craver ; Bede Liu ; Wayne Wolf
On the Possibility of Non-invertible Watermarking Schemes / Qiming Li ; Ee-Chien Chang
Reversing Global and Local Geometrical Distortions in Image Watermarking / Dariusz Bogumil
On Achievable Regions of Public Multiple-Access Gaussian Watermarking Systems / Wei Sun ; En-hui Yang
Fixed-Distortion Orthogonal Dirty Paper Coding for Perceptual Still Image Watermarking / Andrea Abrardo ; Mauro Barni
Steganalysis: Session Chair / Session 2:
Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes / Jessica Fridrich
Exploiting Preserved Statistics for Steganalysis / Rainer Böhme ; Andreas Westfeld
Improved Detection of LSB Steganography in Grayscale Images / Andrew D. Ker
An Improved Sample Pairs Method for Detection of LSB Embedding / Peizhong Lu ; Xiangyang Luo ; Qingyang Tang ; Li Shen
Forensic Applications: Session Chair / Session 3:
Statistical Tools for Digital Forensics / Alin C. Popescu ; Hany Farid
Relative Generic Computational Forensic Techniques / Jennifer L. Wong ; Miodrag Potkonjak
Steganography: Session Chair / Session 4:
Syntax and Semantics-Preserving Application-Layer Protocol Steganography / Norka B. Lucena ; James Pease ; Payman Yadollahpour ; Steve J. Chapin
A Method of Linguistic Steganography Based on Collocationally-Verified Synonymy / Igor A. Bolshakov
Software Watermarking: Session Chair / John McHughSession 5:
Graph Theoretic Software Watermarks: Implementation, Analysis, and Attacks / Christian Collberg ; Andrew Huntwork ; Edward Carter ; Gregg Townsend
Threading Software Watermarks / Jasvir Nagra ; Clark Thomborson
Soft IP Protection: Watermarking HDL Codes / Lin Yuan ; Pushkin R. Pari ; Gang Qu
Security and Privacy: Session Chair / Ross AndersonSession 6:
An Asymmetric Security Mechanism for Navigation Signals / Markus G. Kuhn
Analysis of COT-based Fingerprinting Schemes: New Approach to Design Practical and Secure Fingerprinting Scheme / Jae-Gwi Choi ; Ji-Hwan Park ; Ki-Ryong Kwon
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures / Xinwen Fu ; Bryan Graham ; Dong Xuan ; Riccardo Bettati ; Wei Zhao
Optimization and Evaluation of Randomized c-Secure CRT Code Defined on Polynomial Ring / Hirofumi Muratani
Anonymity: Session Chair / Andreas PfitzmannSession 7:
Statistical Disclosure or Intersection Attacks on Anonymity Systems / George Danezis ; Andrei Serjantov
Reasoning About the Anonymity Provided by Pool Mixes That Generate Dummy Traffic / Claudia DÃaz ; Bart Preneel
The Hitting Set Attack on Anonymity Protocols / Dogan Kesdogan ; Lexi Pimenidis
Data Hiding in Unusual Content: Session Chair / Session 8:
Information Hiding in Finite State Machine
Covert Channels for Collusion in Online Computer Games / Steven J. Murdoch ; Piotr Zielinski
Author Index
Digital Media Watermarking: Session Chair / Lisa MarvelSession 1:
An Implementation of, and Attacks on, Zero-Knowledge Watermarking / Scott Craver ; Bede Liu ; Wayne Wolf
On the Possibility of Non-invertible Watermarking Schemes / Qiming Li ; Ee-Chien Chang
Stefano Spaccapietra, Elisa Bertino, Sushil Jajodia, Takeo Kanade, Roger King, Dennis McLeod, Maria E. Orlowska, S. Spaccapietra, Leon Strous, Roger B. King
出版情報:
Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005