Information Sciences and Systems 2013 (Record no. 55775)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05427nam a22004815i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-319-01604-7 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200421111845.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 130923s2013 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9783319016047 |
-- | 978-3-319-01604-7 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.7 |
245 10 - TITLE STATEMENT | |
Title | Information Sciences and Systems 2013 |
Sub Title | Proceedings of the 28th International Symposium on Computer and Information Sciences / |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XIII, 440 p. 116 illus., 66 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Electrical Engineering, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Section 1: Smart Algorithms -- Adaptive Curve Tailoring -- Regularizing Soft Decision Trees -- A Simple Yet Fast Algorithm for the Closest-Pair Problem Using Sorted Projections on Multi-dimensions -- DARWIN - A Genetic Algorithm Language -- Distributed Selfish Algorithms for the Max-Cut game -- Section 2: Analysis, Modelling and Optimisation -- Distributed Binary Consensus in Dynamic Networks -- Computing bounds of the MTTF for a set of Markov Chains -- Analysing and Predicting Patient Arrival Times in Hospitals using Hidden Markov Models -- Optimal Behaviour of Smart Wireless Users -- Hyper-heuristics for Performance Optimization of Simultaneous Multithreaded Processors -- A Model of Speculative Parallel Scheduling in Networks of Unreliable Sensors -- Energy-Aware Admission Control for Wired Networks -- Section 3: Computational Linguistics -- Named Entity Recognition in Turkish with Bayesian Learning and Hybrid Approaches -- Transfer Learning Using Twitter Data for Improving Sentiment Classification of Turkish Political News -- A Fully Semantic Approach to Large Scale Text Categorization -- Emotion Analysis on Turkish Texts -- A Comparative Study to Determine the Effective Window Size of Turkish Word Sense Disambiguation Systems -- Section 4: Computer Vision -- Eyes Detection Combined Feature Extraction and Mouth Information -- Depth From Moving Apertures -- Score Level Fusion for Face-Iris Multimodal Biometric System -- Feature Selection for Enhanced 3D Facial Expression Recognition Based On Varying Feature Point Distances -- Section 5: Data and Web Engineering -- DAPNA: An Architectural Framework for Data Processing Networks -- Crescent: A Byzantine Fault Tolerant Delivery Framework for Durable Composite Web Services -- Morphological Document Recovery in HSI space -- Ontological Approach to Data Warehouse Source Integration -- Adaptive Oversampling with Active Learning in Imbalanced Data Classication -- Section 6: Wireless Sensor Networks -- Energy-Aware Distributed Hash Table-based Bootstrapping Protocol for Randomly Deployed Heterogeneous Wireless Sensor Networks -- Sensor-Activity Relevance in Human Activity Recognition with Wearable Motion Sensors and Mutual Information Criterion -- Routing Emergency Evacuees with Cognitive Packet Networks -- Detection and Evaluation of Physical Therapy Exercises by Dynamic Time Warping Using Wearable Motion Sensor Units -- Section 7: Network Security, Data Integrity and Privacy -- Commutative Matrix-Based Diffie-Hellman-Like Key-Exchange Protocol -- Anonymity in Multi-Instance Micro-Data Publication -- Homomorphic Minimum Bandwidth Repairing Codes -- Recreating a Large-scale BGP Incident in a Realistic Environment -- Uneven Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor Networks -- NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem -- Towards Visualizing mobile network data -- Infrastructure for Detecting Android Malware -- NEMESYS: First Year Project Experience in Telecom Italia Information Technology -- Android Security, Pitfalls, Lessons Learned and BYOD -- Mobile Network Threat Analysis & MNO Positioning -- Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach. |
520 ## - SUMMARY, ETC. | |
Summary, etc | Based on a rigorous selection from 67 proposals coming from across the world, this volume includes some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. The book will provide the reader with timely access to innovative research from many different areas of the world where advances in computing and communications are created. . |
700 1# - AUTHOR 2 | |
Author 2 | Gelenbe, Erol. |
700 1# - AUTHOR 2 | |
Author 2 | Lent, Ricardo. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://dx.doi.org/10.1007/978-3-319-01604-7 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Cham : |
-- | Springer International Publishing : |
-- | Imprint: Springer, |
-- | 2013. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer organization. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Science. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Information Systems Applications (incl. Internet). |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Systems Organization and Communication Networks. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 1876-1100 ; |
912 ## - | |
-- | ZDB-2-SCS |
No items available.