Skip to main content
  • Conference proceedings
  • © 2005

Computational Intelligence and Security

International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part I

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3801)

Part of the book sub series: Lecture Notes in Artificial Intelligence (LNAI)

Conference series link(s): CIS: International Conference on Computational and Information Science

Conference proceedings info: CIS 2005.

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (165 papers)

  1. Learning and Fuzzy Systems

    1. A New Approach for Regression: Visual Regression Approach

      • Deyu Meng, Chen Xu, Wenfeng Jing
      Pages 139-144
    2. Orthogonally Rotational Transformation for Naive Bayes Learning

      • Limin Wang, Chunhong Cao, Haijun Li, Haixia Chen, Liyan Dong
      Pages 145-150
    3. Efficient Learning Bayesian Networks Using PSO

      • Tao Du, S. S. Zhang, Zongjiang Wang
      Pages 151-156
    4. Improving K-Modes Algorithm Considering Frequencies of Attribute Values in Mode

      • Zengyou He, Shengchun Deng, Xiaofei Xu
      Pages 157-162
    5. Distance Protection of Compensated Transmission Line Using Computational Intelligence

      • S. R. Samantaray, P. K. Dash, G. Panda, B. K. Panigrahi
      Pages 163-169
  2. Evolutionary Computation

    1. Preference Bi-objective Evolutionary Algorithm for Constrained Optimization

      • Yuping Wang, Dalian Liu, Yiu-Ming Cheung
      Pages 184-191
    2. Self-adaptive Differential Evolution

      • Mahamed G. H. Omran, Ayed Salman, Andries P. Engelbrecht
      Pages 192-199
    3. Finding Optimal Addition Chains Using a Genetic Algorithm Approach

      • Nareli Cruz-Cortés, Francisco Rodríguez-Henríquez, Raúl Juárez-Morales, Carlos A. Coello Coello
      Pages 208-215
    4. Model and Convergence for the Combination of Genetic Algorithm and Ant Algorithm

      • Jianli Ding, Wansheng Tang, Yufu Ning
      Pages 230-237

Other Volumes

  1. Computational Intelligence and Security

Editors and Affiliations

  • Microelectronic Instiute, Xidian University, Xi’an, China

    Yue Hao

  • Department of Computer Science, Hong Kong Baptist University, Kowloon Tong, Hong Kong

    Jiming Liu

  • School of Computer Science and Technology, Xidian University, Xi’an, China

    Yuping Wang

  • Department of Computer Science, Hong Kong Baptist University, Hong Kong,  

    Yiu-ming Cheung

  • School of Electrical and Electronic Engineering, University of Manchester, UK

    Hujun Yin

  • Life Science Research Center, School of Electronic Engineering, Xidian University, Xi’an, China

    Licheng Jiao

  • Key Laboratory of Computer Networks and Information Security (Ministry of Education), Xidian University, Xi’an, China

    Jianfeng Ma

  • National Laboratory of Antennas and Microwave Technology, Xidian University, Xi’an, P.R. China

    Yong-Chang Jiao

Bibliographic Information

Buy it now

Buying options

eBook USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access