By Topic

IEEE Computational Intelligence Magazine

Issue 2 • Date May 2008

Filter Results

Displaying Results 1 - 24 of 24
  • Front cover - IEEE Computational Intelligence Magazine - May 2008

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (499 KB)
    Freely Available from IEEE
  • Table of contents - Vol 3 No 2

    Publication Year: 2008
    Request permission for commercial reuse | PDF file iconPDF (309 KB)
    Freely Available from IEEE
  • CI-based Cyber Security applications [Editor's Remarks]

    Publication Year: 2008, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (95 KB) | HTML iconHTML
    Freely Available from IEEE
  • Our continuing focus on education [President's Message]

    Publication Year: 2008, Page(s): 3
    Request permission for commercial reuse | PDF file iconPDF (88 KB) | HTML iconHTML
    Freely Available from IEEE
  • IEEE Frank Rosenblatt Technical Field Award [Society Briefs]

    Publication Year: 2008, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (241 KB)
    Freely Available from IEEE
  • IEEE Fellows-Class of 2008 [Society Briefs]

    Publication Year: 2008, Page(s):5 - 9
    Request permission for commercial reuse | PDF file iconPDF (407 KB)
    Freely Available from IEEE
  • Newly elected AdCom Members-Class of 2010 [Society Briefs]

    Publication Year: 2008, Page(s):9 - 11
    Request permission for commercial reuse | PDF file iconPDF (430 KB)
    Freely Available from IEEE
  • Interview with Jim Bezdek, University of West Florida, USA [Career Profile]

    Publication Year: 2008, Page(s):12 - 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (820 KB) | HTML iconHTML

    Presents an interview and profile of Jim Bezdek, the recipient of the 2007 IEEE Technical Field Award. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interview with Tim Havens, University of Missouri, USA [Focus on Students]

    Publication Year: 2008, Page(s):15 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (912 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2008 IEEE World Congress on Computational Intelligence - Call for Participations

    Publication Year: 2008, Page(s): 17
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • Hong Kong Chapter Report [Family Corner]

    Publication Year: 2008, Page(s):18 - 20
    Request permission for commercial reuse | PDF file iconPDF (1142 KB)
    Freely Available from IEEE
  • Special issue on computational intelligence in cyber security [Preface]

    Publication Year: 2008, Page(s): 21
    Cited by:  Papers (1)
    Request permission for commercial reuse | PDF file iconPDF (52 KB) | HTML iconHTML
    Freely Available from IEEE
  • Immunocomputing for intelligent intrusion detection

    Publication Year: 2008, Page(s):22 - 30
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1366 KB) | HTML iconHTML

    Based on immunocomputing, this paper describes an approach to intrusion detection. The approach includes both low-level signal processing (feature extraction) and high-level (intelligent) pattern recognition. The key model is the formal immune network (FIN) including apoptosis (programmed cell death) and immunization, both controlled by cytokines (messenger proteins). Such FIN can be formed from t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy-preserving collaborative data mining

    Publication Year: 2008, Page(s):31 - 41
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2304 KB) | HTML iconHTML

    Data collection is a necessary step in data mining process. Due to privacy reasons, collecting data from different parties becomes difficult. Privacy concerns may prevent the parties from directly sharing the data and some types of information about the data. How multiple parties collaboratively conduct data mining without breaching data privacy presents a challenge. The objective of this paper is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the use of recurrent neural networks to design symmetric ciphers

    Publication Year: 2008, Page(s):42 - 53
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1033 KB) | HTML iconHTML

    In this article, we describe an innovative form of cipher design based on the use of recurrent neural networks. The well-known characteristics of neural networks, such as parallel distributed structure, high computational power, ability to learn and represent knowledge as a black box, are successfully applied to cryptography. The proposed cipher has a relatively simple architecture and, by incorpo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of block ciphers by simple chaotic functions

    Publication Year: 2008, Page(s):54 - 59
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1110 KB) | HTML iconHTML

    The relationships of chaotic functions and cryptography are investigated in this paper. 128-bit symmetric keys are derived from some chaotic function, called simple logistic function (SLF), for suitable parameters. An improved algorithm of discretization of SLF is introduced and applied to the design of block encryption ciphers and key schedules with proper parameters and initial values. These are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Everything that is not important: Negative databases [Research Frontier]

    Publication Year: 2008, Page(s):60 - 63
    Cited by:  Papers (10)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    According to the self-nonself discrimination theory, from a data representation point of view, the collection of all immune cells comprises a distributed model of what self is not; if the model is good enough, then it is also a model of self - the collection of all immune cells define what self is by individually specifying what it is not. The work reviewed in this paper is predominantly inspired ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating trust into the CyberCraft Initiative via the Trust Vectors model [Application Notes]

    Publication Year: 2008, Page(s):65 - 68
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB) | HTML iconHTML

    This research supports the hypothesis that the Trust Vector model can be modified to fit the CyberCraft Initiative, and that there are limits to the utility of historical data. This research proposed some modifications and expansions to the Trust Model Vector, and identified areas for future research. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing Computer Security with Smart Technology [Book Review]

    Publication Year: 2008, Page(s):70 - 71
    Request permission for commercial reuse | PDF file iconPDF (172 KB) | HTML iconHTML
    Freely Available from IEEE
  • CEC 2007 Conference Report [Conference Reports]

    Publication Year: 2008, Page(s):72 - 73
    Cited by:  Papers (3)
    Request permission for commercial reuse | PDF file iconPDF (837 KB)
    Freely Available from IEEE
  • 2007 IEEE International Conference on Granular Computing [Conference Reports]

    Publication Year: 2008, Page(s): 74
    Request permission for commercial reuse | PDF file iconPDF (681 KB)
    Freely Available from IEEE
  • Call for Papers - A special issue of Computational Intelligence Magazine on Computational Intelligence

    Publication Year: 2008, Page(s): 75
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Application-specific publications [Member's Inquiry]

    Publication Year: 2008, Page(s):76 - 77
    Request permission for commercial reuse | PDF file iconPDF (440 KB)
    Freely Available from IEEE
  • Conference Calendar [2008-2009]

    Publication Year: 2008, Page(s): 78
    Request permission for commercial reuse | PDF file iconPDF (415 KB)
    Freely Available from IEEE

Aims & Scope

The IEEE Computational Intelligence Magazine (CIM) publishes peer-reviewed articles that present emerging novel discoveries, important insights, or tutorial surveys in all areas of computational intelligence design and applications, in keeping with the Field of Interest of the IEEE Computational Intelligence Society (IEEE/CIS). 

Full Aims & Scope