12.07.2015 Views

Workshop Program - Instituto de Investigaciones Eléctricas

Workshop Program - Instituto de Investigaciones Eléctricas

Workshop Program - Instituto de Investigaciones Eléctricas

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

SPONSORS:LOCATION:Mexican <strong>Workshop</strong>s on Artificial IntelligenceNovember 5 – 6, 2007Aguascalientes City, MEXICOWORKSHOP PROGRAMMexican Society of Artificial Intelligence (SMIA)Tecnológico <strong>de</strong> Monterrey: Campus Ciudad <strong>de</strong> México (ITESM – CEM)<strong>Instituto</strong> <strong>de</strong> <strong>Investigaciones</strong> Eléctricas (IIE)Universidad Tecnológica <strong>de</strong> Aguascalientes (UTA)Av. Juan Pablo II #1302, Fracc. Ex-hacienda la CanteraCP: 20206, Aguascalientes, MexicoPhone: 449 9105000 or 449 976-07-29ORGANIZATION:WORKSHOPS CHAIRS:LOCAL CHAIRS:WORKSHOPS:Service RobotsData Mining Applications & Current TrendsApplications of Artificial IntelligenceComputer securityRaúl Monroy, ITESM – CEMGustavo Arroyo-Figueroa, IIEVíctor Manuel Gonzalez, UTAEduardo Serna Perez, UAAEnrique Sucar, INAOEJ. Savage, UNAME. Morales, INAOEManuel Mejía, IIEE. Morales, INAOEG. Arroyo-Figueroa, IIER. Monroy, ITESM – CEMCarlos Mex-Pereda,ITESM-MTY


===============================================================MICAI 2007: <strong>Workshop</strong> in Computer Security--------------------------------------------------------------------------------------------------------------Monday November 5, 2007Universidad Tecnológica <strong>de</strong> Aguascalientes (UTA)Edificio <strong>de</strong> Vinculación, Aula Panisoptica--------------------------------------------------------------------------------------------------------------<strong>Program</strong>-------------------2:00 - 2:05 Opening2:05 - 4:05: (each talk is allocated a 30 min slot)* An Architecture and for Security Policy Management on HomogeneousNetworksPedro Chávez and Juan J. Flores (Universidad Michoacana) and Juan M.García G. (<strong>Instituto</strong> Tecnológico Morelia)* A First Approach to Un<strong>de</strong>rstanding the Anomalies on my PCLuis M. Fernán<strong>de</strong>z, Hugo Terashima and Manuel Valenzuela (ITESM Mty)* Masquera<strong>de</strong> Attacks Based on User's ProfileIván Razo and Carlos Mex-Perera (ITESM Mty) and Raúl Monroy (ITESMCEM)* On the Characterization of Attacks FamiliesKaren A. García and Raúl Monroy (ITESM CEM)4:05 – 4:30 Coffee break.4:30 – 6:30: (each talk is allocated a 30 min slot)* Vi<strong>de</strong>o Watermarking Algorithm Resilient to MPEG-E Compression andCollusion AttacksRogelio Reyes, Clara Cruz, Mariko Nakano and Héctor Pérez (ESIMECulhuacan)* Robust Image Watermarking System Based in Digital SignatureClara Cruz, Rogelio Reyes, Mariko Nakano and Héctor Pérez (ESIMECulhuacan)* SHRIMP: a Smart metHod for Repairing IMperfect security ProtocolsJuan C. López P. (ITESM CEM)* Type Flaw AttacksRaúl Monroy and Juan C. López P. (ITESM CEM)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!