000 02159nmm a22004935u 4500
001 vtls000360278
003 RU-ToGU
005 20210922024846.0
007 cr nn 008mamaa
008 120828s2005 xx j eng d
020 _a9783540315988
035 _ato000360278
040 _aSpringer
_cSpringer
_dRU-ToGU
100 1 _aCheung, Yiu-ming.
_9323371
245 1 0 _aComputational Intelligence and Security (vol. # 3802)
_hЭлектронный ресурс
_bInternational Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II
_cedited by Yiu-ming CheungYue Hao, Licheng Jiao, Yong-Chang Jiao et al.
260 _aBerlin Heidelberg :
_bSpringer-Verlag GmbH.,
_c2005
490 1 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v3802
650 0 _aArtificial intelligence
_9274099
650 0 _aComputer Science
_9155490
650 0 _aComputer software
_9303280
650 0 _aInformation storage and retrieval systems
_9137013
650 0 _aInformation systems
_9303226
650 0 _aInformation systems
_9303226
650 1 4 _aComputer Science
_9155490
650 2 4 _aAlgorithm Analysis and Problem Complexity
_9303732
650 2 4 _aArtificial Intelligence (incl. Robotics)
_9274102
650 2 4 _aComputation by Abstract Devices
_9305111
650 2 4 _aInformation Storage and Retrieval
_9303027
650 2 4 _aInformation Systems Applications (incl.Internet)
_9304235
650 2 4 _aManagement of Computing and Information Systems
_9303227
700 1 _aHao, Yue
_9323372
700 1 _aJiao, Licheng
_9323373
700 1 _aJiao, Yong-Chang
_9323374
700 1 _aLiu, Jiming
_9317954
700 1 _aMa, Jianfeng
_9323375
700 1 _aWang, Yuping
_9323376
700 1 _aYin, Hujun
_9323377
710 2 _aSpringerLink (Online service)
_9143950
773 0 _tSpringer e-books
830 _aLecture Notes in Computer Science,
_9279505
856 4 0 _uhttp://dx.doi.org/10.1007/11596981
999 _c237097