This book constitutes the refereed proceedings of the 9th Asian Computing Science Conference, ASIAN 2004, dedicated to Jean-Louis Lassez on the occasion of his 60th birthday and held in Chiang Mai, Thailand in December 2004.
The 17 revised full papers presented together with 3 keynote papers and 16 invited papers honouring Jean-Louis Lassez were carefully reviewed and selected from 75 submissions. The contributed papers are focusing on higher-level decision making, whereas the invited papers address a broader variety of topics in theoretical computer science.
Author(s): Philippe Flajolet (auth.), Michael J. Maher (eds.)
Series: Lecture Notes in Computer Science 3321
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005
Language: English
Pages: 510
Tags: Theory of Computation; Artificial Intelligence (incl. Robotics); Software Engineering/Programming and Operating Systems; Data Encryption; Discrete Mathematics in Computer Science; Information Systems Applications (incl.Internet)
Front Matter....Pages -
Counting by Coin Tossings....Pages 1-12
On the Role Definitions in and Beyond Cryptography....Pages 13-32
Meme Media for the Knowledge Federation Over the Web and Pervasive Computing Environments....Pages 33-47
Probabilistic Space Partitioning in Constraint Logic Programming....Pages 48-62
Chi-Square Matrix: An Approach for Building-Block Identification....Pages 63-77
Design Exploration Framework Under Impreciseness Based on Register-Constrained Inclusion Scheduling....Pages 78-92
Hiord : A Type-Free Higher-Order Logic Programming Language with Predicate Abstraction....Pages 93-108
Assessment Aggregation in the Evidential Reasoning Approach to MADM Under Uncertainty: Orthogonal Versus Weighted Sum....Pages 109-127
Learnability of Simply-Moded Logic Programs from Entailment....Pages 128-141
A Temporalised Belief Logic for Specifying the Dynamics of Trust for Multi-agent Systems....Pages 142-156
Using Optimal Golomb Rulers for Minimizing Collisions in Closed Hashing....Pages 157-168
Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption....Pages 169-181
Deniable Partial Proxy Signatures....Pages 182-194
Formal Concept Mining: A Statistic-Based Approach for Pertinent Concept Lattice Construction....Pages 195-211
A Robust Approach to Content-Based Musical Genre Classification and Retrieval Using Multi-feature Clustering....Pages 212-222
Registration of 3D Range Images Using Particle Swarm Optimization....Pages 223-235
Zero-Clairvoyant Scheduling with Inter-period Constraints....Pages 236-247
A Novel Texture Synthesis Based Algorithm for Object Removal in Photographs....Pages 248-258
Highly Efficient and Effective Techniques for Thai Syllable Speech Recognition....Pages 259-270
Robot Visual Servoing Based on Total Jacobian....Pages 271-285
Online Stochastic and Robust Optimization....Pages 286-300
Optimal Constraint Decomposition for Distributed Databases....Pages 301-319
Adaptive Random Testing....Pages 320-329
Minimal Unsatisfiable Sets: Classification and Bounds....Pages 330-342
LPOD Answer Sets and Nash Equilibria....Pages 343-351
Graph Theoretic Models for Reasoning About Time....Pages 352-362
Rule-Based Programming and Proving: The ELAN Experience Outcomes....Pages 363-379
Towards Flexible Graphical Communication Using Adaptive Diagrams....Pages 380-394
A Framework for Compiler Driven Design Space Exploration for Embedded System Customization....Pages 395-406
Spectral-Based Document Retrieval....Pages 407-417
Metadata Inference for Document Retrieval in a Distributed Repository....Pages 418-436
A Simple Theory of Expressions, Judgments and Derivations....Pages 437-451
Reactive Framework for Resource Aware Distributed Computing....Pages 452-467
The Feature Selection and Intrusion Detection Problems....Pages 468-482
On the BDD of a Random Boolean Function....Pages 483-493
Concurrent Constraint-Based Memory Machines: A Framework for Java Memory Models (Summary)....Pages 494-508
Back Matter....Pages -