000 | 05629nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-540-32370-9 | ||
003 | DE-He213 | ||
005 | 20161121231021.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2005 gw | s |||| 0|eng d | ||
020 |
_a9783540323709 _9978-3-540-32370-9 |
||
024 | 7 |
_a10.1007/3-540-32370-8 _2doi |
|
050 | 4 | _aQ334-342 | |
050 | 4 | _aTJ210.2-211.495 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aTJFM1 _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
082 | 0 | 4 |
_a006.3 _223 |
100 | 1 |
_aDunin-Kęplicz, Barbara. _eauthor. |
|
245 | 1 | 0 |
_aMonitoring, Security, and Rescue Techniques in Multiagent Systems _h[electronic resource] / _cby Barbara Dunin-Kęplicz, Andrzej Jankowski, Andrzej Skowron, Marcin Szczuka. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2005. |
|
300 |
_aXII, 596 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aAdvances in Soft Computing, _x1615-3871 ; _v28 |
|
505 | 0 | _aFoundations and Methods -- Flow Graphs, their Fusion and Data Analysis -- Approximation Spaces for Hierarchical Intelligent Behavioral System Models -- Distributed Adaptive Control: Beyond Single-Instant, Discrete Control Variables -- Multi-agent Planning for Autonomous Agents’ Coordination -- Creating Common Beliefs in Rescue Situations -- Coevolutionary Processes for Strategic Decisions -- Automatic Proofs of Protocols via Program Transformation -- Mereological Foundations to Approximate Reasoning -- Data Security and Null Value Imputation in Distributed Information Systems -- Basic Principles and Foundations of Information Monitoring Systems -- Modelling Unreliable and Untrustworthy Agent Behaviour -- Nearest Neighbours without k -- Classifiers Based on Approximate Reasoning Schemes -- Towards Rough Applicability of Rules -- On the Computer-Assisted Reasoning about Rough Sets -- Similarity-Based Data Reduction and Classification -- Decision Trees and Reducts for Distributed Decision Tables -- Learning Concept Approximation from Uncertain Decision Tables -- In Search for Action Rules of the Lowest Cost -- Circularity in Rule Knowledge Bases Detection using Decision Unit Approach -- Feedforward Concept Networks -- Extensions of Partial Structures and Their Application to Modelling of Multiagent Systems -- Tolerance Information Granules -- Attribute Reduction Based on Equivalence Relation Defined on Attribute Set and Its Power Set -- Query Cost Model Constructed and Analyzed in a Dynamic Environment -- The Efficiency of the Rules’ Classification Based on the Cluster Analysis Method and Salton’s Method -- Extracting Minimal Templates in a Decision Table -- Application Domains and Case Studies -- Programming Bounded Rationality -- Generalized Game Theory’s Contribution to Multi-agent Modelling -- Multi-Agent Decision Support System for Disaster Response and Evacuation -- Intelligent System for Environmental Noise Monitoring -- Multi-agent and Data Mining Technologies for Situation Assessment in Security-related Applications -- Virtual City Simulator for Education, Training, and Guidance -- Neurocomputing for Certain Bioinformatics Tasks -- Rough Set Based Solutions for Network Security -- Task Assignment with Dynamic Token Generation -- DyKnow: A Framework for Processing Dynamic Knowledge and Object Structures in Autonomous Systems -- Classifier Monitoring using Statistical Tests -- What Do We Learn When We Learn by Doing? Toward a Model of Dorsal Vision -- Rough Mereology as a Language for a Minimalist Mobile Robot’s Eenvironment Description -- Data Acquisition in Robotics -- Spatial Sound Localization for Humanoid -- Oculomotor Humanoid Active Vision System -- Crisis Management via Agent-based Simulation -- Monitoring in Multi-Agent Systems: Two Perspectives -- Multi-Agent Environment for Management of Crisis in an Enterprises-Markets Complex -- Behavior Based Detection of Unfavorable Events Using the Multiagent System -- Intelligent Medical Systems on Internet Technologies Platform. | |
520 | _aIn today’s society the issue of security has become a crucial one. The use of knowledge-based technology in security applications emerges with important applications in monitoring, control, crisis and rescue management. This volume contains extended and improved versions of selected contributions presented at the International Workshop "Monitoring, Security and Rescue Techniques in Multiagent Systems" (MSRAS 2004) held in Plock, Poland, June 7-9, 2004, bringing together world’s leading researchers in the field. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aInformation technology. | |
650 | 0 |
_aBusiness _xData processing. |
|
650 | 0 | _aComputers. | |
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aApplied mathematics. | |
650 | 0 | _aEngineering mathematics. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aArtificial Intelligence (incl. Robotics). |
650 | 2 | 4 | _aAppl.Mathematics/Computational Methods of Engineering. |
650 | 2 | 4 | _aInformation Systems and Communication Service. |
650 | 2 | 4 | _aIT in Business. |
700 | 1 |
_aJankowski, Andrzej. _eauthor. |
|
700 | 1 |
_aSkowron, Andrzej. _eauthor. |
|
700 | 1 |
_aSzczuka, Marcin. _eauthor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783540232452 |
830 | 0 |
_aAdvances in Soft Computing, _x1615-3871 ; _v28 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/3-540-32370-8 |
912 | _aZDB-2-ENG | ||
950 | _aEngineering (Springer-11647) | ||
999 |
_c507355 _d507355 |