Artificial Intelligence and Simulation: 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, Jeju Island, Korea, October 4-6, 2004, Revised Selected PapersTag G. Kim Springer Science & Business Media, 31 січ. 2005 р. - 711 стор. The AI, Simulation and Planning in High Autonomy Systems (AIS) 2004 C- ference was held on Jeju Island, Korea, October 4-6, 2004. AIS 2004 was the thirteenth in the series ofbiennial conferences on AI and simulation.The conf- enceprovidedthemajorforumforresearchers, scientistsandengineerstopresent the state-of-the-art research results in the theory and applications of AI, si- lation and their fusion. We were pleased that the conference attracted a large number of high-quality research papers that were of bene't to the communities of interest. This volume is the proceedings of AIS 2004. For the conference full-length versionsofallsubmittedpaperswererefereedbytherespectiveinternationalp- gram committee, each paper receiving at least two independent reviews. Careful reviews from the committee selected 77 papers out of 170 submissions for oral presentation. This volume includes the invited speakers' papers, along with the papers presented in the conference. In additionto the scienti'ctrackspresented, the conferencefeatured keynote talks by two invited speakers: Bernard Zeigler (University of Arizona, USA) and Norman Foo (University of New South Wales, Australia). We were grateful to them for accepting our invitation and for their talks. We also would like to express our gratitude to all contributors, reviewers, program committee and organizingcommitteememberswhomadetheconferenceverysuccessful.Special thanks are due to Tae-Ho Cho, the Program Committee Chair of AIS 2004 for his hard work in the various aspects of conference organization. Finally, we wouldlike to acknowledgepartial'nancial support by KAIST for the conference. We also would like to acknowledge the publication support from Springer. |
Зміст
Keynotes | 1 |
Modeling and Simulation Methodologies I | 14 |
A Disaster Relief Simulation Model of a Building Fire | 33 |
Evaluation of Transaction Risks of Mean Variance Model Under Identical | 42 |
Association Rule Discovery in Data Mining | 50 |
Reorder Decision System Based on the Concept of the Order Risk | 61 |
Computer and Network Security I | 81 |
Recognition of Human Action for Game System | 100 |
A Discrete Event Simulation Study for Incoming Call Centers | 390 |
Using a Clustering Genetic Algorithm to Support Customer Segmentation | 409 |
System Properties of Action Norman Foo and Pavlos Peppas | 416 |
Identification of Gene Interaction Networks | 428 |
ComponentBased Modeling | 440 |
Component Architecture Redesigning Approach | 449 |
A Workflow Variability Design Technique | 460 |
Measuring Semantic Similarity | 470 |
HLA and Simulator Interoperation | 117 |
High Performance Modeling for Distributed Simulation | 138 |
Manufacturing | 157 |
Simulation of Artificial Life Model in Game Space | 179 |
Email Classification Agent | 207 |
The Investigation of the Agent in the Artificial Market | 215 |
PlanBased Coordination of a Multiagent System | 224 |
DEVS Modeling and Simulation | 233 |
State Minimization of SPDEVS | 243 |
A Hierarchical Generation Scheme Sangjoon Park and Kwanjoong Kim | 253 |
Does Rational Decision Making Always Lead to High Social Welfare? | 262 |
Parallel and Distributed Modeling and Simulation I | 285 |
Research and Implementation of the ContextAware Middleware | 295 |
An Efficient RealTime Middleware Scheduling Algorithm | 304 |
Mapping Cooperating GRID Applications | 313 |
Mobile Computer Network | 323 |
Timestamp Based Concurrency Control in Broadcast Disks Environment | 333 |
Active Information Based RRK Routing for Mobile Ad Hoc Network | 342 |
WebBased Simulation Natural System | 351 |
Ontology Based Integration of Web Databases | 360 |
A Web ServicesBased Distributed Simulation Architecture | 370 |
Automated Cyberattack Scenario Generation | 380 |
3D Watermarking Shape Recognition System | 481 |
Ho Seok Moon Myung Ho Sohn and Dong Sik Jang | 492 |
Cropping Rotation and Scaling Invariant LBX Interleaved | 498 |
Parallel and Distributed Modeling and Simulation II | 508 |
A Web Cluster Simulator for Performance Analysis | 528 |
Visualization Graphics and Animation I | 547 |
A Layered Scripting Language Technique | 565 |
Computer and Network Security II | 585 |
Transient Time Analysis of Network Security Survivability Using DEVS | 607 |
A Harmful Content Protection in PeertoPeer Networks Taekyong Nam Ho Gyun Lee Chi Yoon Jeong and Chimoon Han | 617 |
Business Modeling | 627 |
DiscreteEvent Semantics for Tools for Business Process Modeling | 635 |
An Architecture Modelling of a Workflow Management System | 645 |
Client Authentication Model | 655 |
Visualization Graphics and Animation II | 663 |
Integrated Term Weighting Visualization and User Interface Development | 673 |
A ConceptBased Document Categorization System | 683 |
DEVS Modeling and Simulation | 692 |
Simulation Semantics for MinMax DEVS Models | 699 |
709 | |
Інші видання - Показати все
Artificial Intelligence and Simulation: 13th International Conference on AI ... Tag G. Kim Обмежений попередній перегляд - 2005 |
Artificial Intelligence and Simulation: 13th International Conference on AI ... Tag G. Kim Попередній перегляд недоступний - 2005 |
Загальні терміни та фрази
agent algorithm analysis application architecture association rules attack behavior Berlin Heidelberg 2005 centipede game child DEVS model client cluster manager communication component Computer data management data mining database defined DFSS discrete event distributed simulation dynamic environment evaluation execution Façade pattern federation FedEx function hierarchical High Level Architecture IEEE implementation input inter-federation interaction interface Internet Internet security system interoperability IPsec keyword Korea LNAI load balancing management module mapping method middleware modeling and simulation node object operation output packet paper parameters parent DEVS model performance Petri net Policy PPSS proposed protocol query query expansion real-time reflector route router scheduling sequence server shows simulation model SP-DEVS specification spot structure Symbol T.G. Kim tion traceback transaction transition TSRG vulnerability web services WTMT