Artificial Intelligence and Simulation: 13th International Conference on AI, Simulation, Planning in High Autonomy Systems, AIS 2004, Jeju Island, Korea, October 4-6, 2004, Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed post-proceedings of the 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, held in Jeju Island, Korea in October 2004.

The 74 revised full papers presented together with 2 invited keynote papers were carefully reviewed and selected from 170 submissions; after the conference, the papers went through another round of revision. The papers are organized in topical sections on modeling and simulation methodologies, intelligent control, computer and network security, HLA and simulator interoperation, manufacturing, agent-based modeling, DEVS modeling and simulation, parallel and distributed modeling and simulation, mobile computer networks, Web-based simulation and natural systems, modeling and simulation environments, AI and simulation, component-based modeling, watermarking and semantics, graphics, visualization and animation, and business modeling.

Author(s): Bernard P. Zeigler, Rajanikanth Jammalamadaka, Salil R. Akerkar (auth.), Tag Gon Kim (eds.)
Series: Lecture Notes in Computer Science 3397 : Lecture Notes in Artificial Intelligence
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005

Language: English
Pages: 716
Tags: Artificial Intelligence (incl. Robotics); Simulation and Modeling; Computer Communication Networks; Computer Graphics

Front Matter....Pages -
Continuity and Change (Activity) Are Fundamentally Related in DEVS Simulation of Continuous Systems....Pages 1-13
Systems Theory: Melding the AI and Simulation Perspectives....Pages 14-23
Unified Modeling for Singularly Perturbed Systems by Delta Operators: Pole Assignment Case....Pages 24-32
A Disaster Relief Simulation Model of a Building Fire....Pages 33-41
Evaluation of Transaction Risks of Mean Variance Model Under Identical Variance of the Rate of Return – Simulation in Artificial Market....Pages 42-49
Association Rule Discovery in Data Mining by Implementing Principal Component Analysis....Pages 50-60
Reorder Decision System Based on the Concept of the Order Risk Using Neural Networks....Pages 61-70
Simulation Modeling with Hierarchical Planning: Application to a Metal Manufacturing System....Pages 71-80
Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction....Pages 81-89
NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack....Pages 90-99
Recognition of Human Action for Game System....Pages 100-108
The Implementation of IPsec-Based Internet Security System in IPv4/IPv6 Network....Pages 109-116
Describing the HLA Using the DFSS Formalism....Pages 117-127
Proposal of High Level Architecture Extension....Pages 128-137
High Performance Modeling for Distributed Simulation....Pages 138-146
The Hierarchical Federation Architecture for the Interoperability of ROK and US Simulations....Pages 147-156
PPSS: CBR System for ERP Project Pre-planning....Pages 157-166
A Scheduling Analysis in FMS Using the Transitive Matrix....Pages 167-178
Simulation of Artificial Life Model in Game Space....Pages 179-187
An Extensible Framework for Advanced Distributed Virtual Environment on Grid....Pages 188-197
Diffusion of Word-of-Mouth in Segmented Society: Agent-Based Simulation Approach....Pages 198-206
E-mail Classification Agent Using Category Generation and Dynamic Category Hierarchy....Pages 207-214
The Investigation of the Agent in the Artificial Market....Pages 215-223
Plan-Based Coordination of a Multi-agent System for Protein Structure Prediction....Pages 224-232
Using Cell-DEVS for Modeling Complex Cell Spaces....Pages 233-242
State Minimization of SP-DEVS....Pages 243-252
DEVS Formalism: A Hierarchical Generation Scheme....Pages 253-261
Does Rational Decision Making Always Lead to High Social Welfare?....Pages 262-269
Large-Scale Systems Design: A Revolutionary New Approach in Software Hardware Co-design....Pages 270-274
Timed I/O Test Sequences for Discrete Event Model Verification....Pages 275-284
A Formal Description Specification for Multi-resolution Modeling (MRM) Based on DEVS Formalism....Pages 285-294
Research and Implementation of the Context-Aware Middleware Based on Neural Network....Pages 295-303
An Efficient Real-Time Middleware Scheduling Algorithm for Periodic Real-Time Tasks....Pages 304-312
Mapping Cooperating GRID Applications by Affinity for Resource Characteristics....Pages 313-322
Modeling of Policy-Based Network with SVDB....Pages 323-332
Timestamp Based Concurrency Control in Broadcast Disks Environment....Pages 333-341
Active Information Based RRK Routing for Mobile Ad Hoc Network....Pages 342-350
Applying Web Services and Design Patterns to Modeling and Simulating Real-World Systems....Pages 351-359
Ontology Based Integration of Web Databases by Utilizing Web Interfaces....Pages 360-369
A Web Services-Based Distributed Simulation Architecture for Hierarchical DEVS Models....Pages 370-379
Automated Cyber-attack Scenario Generation Using the Symbolic Simulation....Pages 380-389
A Discrete Event Simulation Study for Incoming Call Centers of a Telecommunication Service Company....Pages 390-399
Requirements Analysis and a Design of Computational Environment for HSE (Human-Sensibility Ergonomics) Simulator....Pages 400-408
Using a Clustering Genetic Algorithm to Support Customer Segmentation for Personalized Recommender Systems....Pages 409-415
System Properties of Action Theories....Pages 416-427
Identification of Gene Interaction Networks Based on Evolutionary Computation....Pages 428-439
Modeling Software Component Criticality Using a Machine Learning Approach....Pages 440-448
Component Architecture Redesigning Approach Using Component Metrics....Pages 449-459
A Workflow Variability Design Technique for Dynamic Component Integration....Pages 460-469
Measuring Semantic Similarity Based on Weighting Attributes of Edge Counting....Pages 470-480
3D Watermarking Shape Recognition System Using Normal Vector Distribution Modelling....Pages 481-489
DWT-Based Image Watermarking for Copyright Protection....Pages 490-497
Cropping, Rotation and Scaling Invariant LBX Interleaved Voice-in-Image Watermarking....Pages 498-507
Data Aggregation for Wireless Sensor Networks Using Self-organizing Map....Pages 508-517
Feasibility and Performance Study of a Shared Disks Cluster for Real-Time Processing....Pages 518-527
A Web Cluster Simulator for Performance Analysis of the ALBM Cluster System....Pages 528-537
Dynamic Load Balancing Scheme Based on Resource Reservation for Migration of Agent in the Pure P2P Network Environment....Pages 538-546
Application of Feedforward Neural Network for the Deblocking of Low Bit Rate Coded Images....Pages 547-555
A Dynamic Bandwidth Allocation Algorithm with Supporting QoS for EPON....Pages 556-564
A Layered Scripting Language Technique for Avatar Behavior Representation and Control....Pages 565-573
An Integrated Environment Blending Dynamic and Geometry Models....Pages 574-584
Linux-Based System Modelling for Cyber-attack Simulation....Pages 585-596
A Rule Based Approach to Network Fault and Security Diagnosis with Agent Collaboration....Pages 597-606
Transient Time Analysis of Network Security Survivability Using DEVS....Pages 607-616
A Harmful Content Protection in Peer-to-Peer Networks....Pages 617-626
Security Agent Model Using Interactive Authentication Database....Pages 627-634
Discrete-Event Semantics for Tools for Business Process Modeling in Web-Service Era....Pages 635-644
An Architecture Modelling of a Workflow Management System....Pages 645-654
Client Authentication Model Using Duplicated Authentication Server Systems....Pages 655-662
Dynamic Visualization of Signal Transduction Pathways from Database Information....Pages 663-672
Integrated Term Weighting, Visualization, and User Interface Development for Bioinformation Retrieval....Pages 673-682
CONDOCS: A Concept-Based Document Categorization System Using Concept-Probability Vector with Thesaurus....Pages 683-691
Using DEVS for Modeling and Simulation of Human Behaviour....Pages 692-698
Simulation Semantics for Min-Max DEVS Models....Pages 699-708
Back Matter....Pages -