This is a collection of 27 papers, selected from 85 papers presented at the 2002 Conference on Advanced Computer Systems. The first chapter of the book, “Artificial Intelligence Methods and Intelligent Agents,” consists of 17 papers. The second chapter, “Computer Security and Safety,” contains ten papers. The editors of this book provide their summary in the preface; this makes it easy for readers to select papers that match their interests.
In chapter 1, most of the papers report on different applications of various artificial intelligence methods and intelligent agents. The application areas range from transportation systems and economics to the medical, political, and social sciences. The methods discussed in this chapter include rough sets, fuzzy expert systems, neural networks, multi-agents, and evolutionary algorithms. Uchacz et al. used fuzzy linear programming to optimize vessel traffic, while Smierzchalski applied evolutionary algorithms to avoid collisions at sea. Fuzzy expert systems were applied by Forte for auction reserve prices, by Gisella et al. for a description of the instability in the Middle East, and by Czerniak et al. for presumptive diagnosis of urinary system diseases. These are good examples of applications of different artificial intelligence methods.
In addition to the above applications, several papers also propose some general approaches in modeling and classification, with application examples. Rajer et al. propose a method to investigate variable significance in multi-dimension nonlinear systems with linear localization, and applied the method to analyze 19 factors affecting the unemployment rate in Poland from 1992 through 1999. Nawarecki et al. propose agent-based simulation in the distribution of resources with incomplete information. Smialkowska proposes models of integration in decision support systems. Pechmann et al. present a natural language communication model in a human-computer dialogue.
Chapter 2 consists of ten papers related to computer security and safety. To address user authentication on distributed systems, Kurkowski et al. propose a logical language for the specification of authentication policies, and Pejas reports applying the Ponder language for policy specification and certificate-based access control. In the area of encryption, Srebrny et al. propose a symmetric scheme based on two-dimensional cellular automata, Gajewski presents a family of cryptographic hash functions (the FSR-255), and Kurkowski et al. propose a verification method for cryptographic authentication protocols.
By applying only standard encryption schemes, Gogolewski et al. designed a simple and elegant protocol for storing data securely in a pool of servers. The term “secure” means that the user alone chooses where to store the data, and the number of copies can be determined immediately before storing the data; the server storing the data has no knowledge about other servers storing the same data; and, with high probability, the system is immune from adversaries that may gain control over a limited number of servers.
Risk analysis and management play very important roles in computer security. Cichocki et al. extend failure modes and effects analysis (FMEA) into intensive object-oriented software systems. Gorski et al. present a concept of continuous risk management in distributed software development. Fray focuses his paper on risk analysis and evaluation of e-business systems.
I found this to be a very interesting book, containing both broad applications, and fundamental theories in artificial intelligence and computing security systems. Most of the authors in this book are from Poland; it provides readers with a good overview of recent work done in these fields by our Polish colleagues.