|
|
|
|
LEADER |
05846nam a22005175i 4500 |
001 |
978-3-319-01604-7 |
003 |
DE-He213 |
005 |
20210708135032.0 |
007 |
cr nn 008mamaa |
008 |
130923s2013 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319016047
|9 978-3-319-01604-7
|
024 |
7 |
|
|a 10.1007/978-3-319-01604-7
|2 doi
|
050 |
|
4 |
|a QA76.76.A65
|
072 |
|
7 |
|a UNH
|2 bicssc
|
072 |
|
7 |
|a COM032000
|2 bisacsh
|
072 |
|
7 |
|a UNH
|2 thema
|
072 |
|
7 |
|a UDBD
|2 thema
|
082 |
0 |
4 |
|a 005.7
|2 23
|
245 |
1 |
0 |
|a Information Sciences and Systems 2013
|h [electronic resource] :
|b Proceedings of the 28th International Symposium on Computer and Information Sciences /
|c edited by Erol Gelenbe, Ricardo Lent.
|
250 |
|
|
|a 1st ed. 2013.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a XIII, 440 p. 116 illus., 66 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Electrical Engineering,
|x 1876-1100 ;
|v 264
|
505 |
0 |
|
|a Section 1: Smart Algorithms -- Adaptive Curve Tailoring -- Regularizing Soft Decision Trees -- A Simple Yet Fast Algorithm for the Closest-Pair Problem Using Sorted Projections on Multi-dimensions -- DARWIN - A Genetic Algorithm Language -- Distributed Selfish Algorithms for the Max-Cut game -- Section 2: Analysis, Modelling and Optimisation -- Distributed Binary Consensus in Dynamic Networks -- Computing bounds of the MTTF for a set of Markov Chains -- Analysing and Predicting Patient Arrival Times in Hospitals using Hidden Markov Models -- Optimal Behaviour of Smart Wireless Users -- Hyper-heuristics for Performance Optimization of Simultaneous Multithreaded Processors -- A Model of Speculative Parallel Scheduling in Networks of Unreliable Sensors -- Energy-Aware Admission Control for Wired Networks -- Section 3: Computational Linguistics -- Named Entity Recognition in Turkish with Bayesian Learning and Hybrid Approaches -- Transfer Learning Using Twitter Data for Improving Sentiment Classification of Turkish Political News -- A Fully Semantic Approach to Large Scale Text Categorization -- Emotion Analysis on Turkish Texts -- A Comparative Study to Determine the Effective Window Size of Turkish Word Sense Disambiguation Systems -- Section 4: Computer Vision -- Eyes Detection Combined Feature Extraction and Mouth Information -- Depth From Moving Apertures -- Score Level Fusion for Face-Iris Multimodal Biometric System -- Feature Selection for Enhanced 3D Facial Expression Recognition Based On Varying Feature Point Distances -- Section 5: Data and Web Engineering -- DAPNA: An Architectural Framework for Data Processing Networks -- Crescent: A Byzantine Fault Tolerant Delivery Framework for Durable Composite Web Services -- Morphological Document Recovery in HSI space -- Ontological Approach to Data Warehouse Source Integration -- Adaptive Oversampling with Active Learning in Imbalanced Data Classication -- Section 6: Wireless Sensor Networks -- Energy-Aware Distributed Hash Table-based Bootstrapping Protocol for Randomly Deployed Heterogeneous Wireless Sensor Networks -- Sensor-Activity Relevance in Human Activity Recognition with Wearable Motion Sensors and Mutual Information Criterion -- Routing Emergency Evacuees with Cognitive Packet Networks -- Detection and Evaluation of Physical Therapy Exercises by Dynamic Time Warping Using Wearable Motion Sensor Units -- Section 7: Network Security, Data Integrity and Privacy -- Commutative Matrix-Based Diffie-Hellman-Like Key-Exchange Protocol -- Anonymity in Multi-Instance Micro-Data Publication -- Homomorphic Minimum Bandwidth Repairing Codes -- Recreating a Large-scale BGP Incident in a Realistic Environment -- Uneven Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor Networks -- NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem -- Towards Visualizing mobile network data -- Infrastructure for Detecting Android Malware -- NEMESYS: First Year Project Experience in Telecom Italia Information Technology -- Android Security, Pitfalls, Lessons Learned and BYOD -- Mobile Network Threat Analysis & MNO Positioning -- Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach.
|
520 |
|
|
|a Based on a rigorous selection from 67 proposals coming from across the world, this volume includes some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. The book will provide the reader with timely access to innovative research from many different areas of the world where advances in computing and communications are created. .
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Computer organization.
|
650 |
1 |
4 |
|a Information Systems Applications (incl. Internet).
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I18040
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|0 https://scigraph.springernature.com/ontologies/product-market-codes/I13006
|
700 |
1 |
|
|a Gelenbe, Erol.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Lent, Ricardo.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319016054
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319016030
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319377643
|
830 |
|
0 |
|a Lecture Notes in Electrical Engineering,
|x 1876-1100 ;
|v 264
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-01604-7
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|