Imagen de Google Jackets

Information Sciences and Systems 2013 [electronic resource] : Proceedings of the 28th International Symposium on Computer and Information Sciences / edited by Erol Gelenbe, Ricardo Lent.

Por: Colaborador(es): Tipo de material: TextoTextoSeries Lecture Notes in Electrical Engineering ; 264 | Lecture Notes in Electrical Engineering ; 264Editor: Cham : Springer International Publishing : Imprint: Springer, 2013Descripción: XIII, 440 p. 116 illus., 66 illus. in color. online resourceTipo de contenido:
  • text
Tipo de medio:
  • computer
Tipo de soporte:
  • online resource
ISBN:
  • 9783319016047
Trabajos contenidos:
  • SpringerLink (Online service)
Tema(s): Formatos físicos adicionales: Sin títuloClasificación CDD:
  • 005.7 23
Clasificación LoC:
  • QA76.76.A65
Recursos en línea:
Contenidos:
Springer eBooksResumen: Based on a rigorous selection from 67 proposals coming from across the world, this volume includes some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. The book will provide the reader with timely access to innovative research from many different areas of the world where advances in computing and communications are created.
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
No hay ítems correspondientes a este registro

Section 1: Smart Algorithms -- Adaptive Curve Tailoring -- Regularizing Soft Decision Trees -- A Simple Yet Fast Algorithm for the Closest-Pair Problem Using Sorted Projections on Multi-dimensions -- DARWIN - A Genetic Algorithm Language -- Distributed Selfish Algorithms for the Max-Cut game -- Section 2: Analysis, Modelling and Optimisation -- Distributed Binary Consensus in Dynamic Networks -- Computing bounds of the MTTF for a set of Markov Chains -- Analysing and Predicting Patient Arrival Times in Hospitals using Hidden Markov Models -- Optimal Behaviour of Smart Wireless Users -- Hyper-heuristics for Performance Optimization of Simultaneous Multithreaded Processors -- A Model of Speculative Parallel Scheduling in Networks of Unreliable Sensors -- Energy-Aware Admission Control for Wired Networks -- Section 3: Computational Linguistics -- Named Entity Recognition in Turkish with Bayesian Learning and Hybrid Approaches -- Transfer Learning Using Twitter Data for Improving Sentiment Classification of Turkish Political News -- A Fully Semantic Approach to Large Scale Text Categorization -- Emotion Analysis on Turkish Texts -- A Comparative Study to Determine the Effective Window Size of Turkish Word Sense Disambiguation Systems -- Section 4: Computer Vision -- Eyes Detection Combined Feature Extraction and Mouth Information -- Depth From Moving Apertures -- Score Level Fusion for Face-Iris Multimodal Biometric System -- Feature Selection for Enhanced 3D Facial Expression Recognition Based On Varying Feature Point Distances -- Section 5: Data and Web Engineering -- DAPNA: An Architectural Framework for Data Processing Networks -- Crescent: A Byzantine Fault Tolerant Delivery Framework for Durable Composite Web Services -- Morphological Document Recovery in HSI space -- Ontological Approach to Data Warehouse Source Integration -- Adaptive Oversampling with Active Learning in Imbalanced Data Classication -- Section 6: Wireless Sensor Networks -- Energy-Aware Distributed Hash Table-based Bootstrapping Protocol for Randomly Deployed Heterogeneous Wireless Sensor Networks -- Sensor-Activity Relevance in Human Activity Recognition with Wearable Motion Sensors and Mutual Information Criterion -- Routing Emergency Evacuees with Cognitive Packet Networks -- Detection and Evaluation of Physical Therapy Exercises by Dynamic Time Warping Using Wearable Motion Sensor Units -- Section 7: Network Security, Data Integrity and Privacy -- Commutative Matrix-Based Diffie-Hellman-Like Key-Exchange Protocol -- Anonymity in Multi-Instance Micro-Data Publication -- Homomorphic Minimum Bandwidth Repairing Codes -- Recreating a Large-scale BGP Incident in a Realistic Environment -- Uneven Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor Networks -- NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem -- Towards Visualizing mobile network data -- Infrastructure for Detecting Android Malware -- NEMESYS: First Year Project Experience in Telecom Italia Information Technology -- Android Security, Pitfalls, Lessons Learned and BYOD -- Mobile Network Threat Analysis & MNO Positioning -- Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach.

Based on a rigorous selection from 67 proposals coming from across the world, this volume includes some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. The book will provide the reader with timely access to innovative research from many different areas of the world where advances in computing and communications are created.

ZDB-2-SCS

No hay comentarios en este titulo.

para colocar un comentario.