000 | 05427nam a22004815i 4500 | ||
---|---|---|---|
001 | 978-3-319-01604-7 | ||
003 | DE-He213 | ||
005 | 20200421111845.0 | ||
007 | cr nn 008mamaa | ||
008 | 130923s2013 gw | s |||| 0|eng d | ||
020 |
_a9783319016047 _9978-3-319-01604-7 |
||
024 | 7 |
_a10.1007/978-3-319-01604-7 _2doi |
|
050 | 4 | _aQA76.76.A65 | |
072 | 7 |
_aUNH _2bicssc |
|
072 | 7 |
_aUDBD _2bicssc |
|
072 | 7 |
_aCOM032000 _2bisacsh |
|
082 | 0 | 4 |
_a005.7 _223 |
245 | 1 | 0 |
_aInformation Sciences and Systems 2013 _h[electronic resource] : _bProceedings of the 28th International Symposium on Computer and Information Sciences / _cedited by Erol Gelenbe, Ricardo Lent. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2013. |
|
300 |
_aXIII, 440 p. 116 illus., 66 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Electrical Engineering, _x1876-1100 ; _v264 |
|
505 | 0 | _aSection 1: Smart Algorithms -- Adaptive Curve Tailoring -- Regularizing Soft Decision Trees -- A Simple Yet Fast Algorithm for the Closest-Pair Problem Using Sorted Projections on Multi-dimensions -- DARWIN - A Genetic Algorithm Language -- Distributed Selfish Algorithms for the Max-Cut game -- Section 2: Analysis, Modelling and Optimisation -- Distributed Binary Consensus in Dynamic Networks -- Computing bounds of the MTTF for a set of Markov Chains -- Analysing and Predicting Patient Arrival Times in Hospitals using Hidden Markov Models -- Optimal Behaviour of Smart Wireless Users -- Hyper-heuristics for Performance Optimization of Simultaneous Multithreaded Processors -- A Model of Speculative Parallel Scheduling in Networks of Unreliable Sensors -- Energy-Aware Admission Control for Wired Networks -- Section 3: Computational Linguistics -- Named Entity Recognition in Turkish with Bayesian Learning and Hybrid Approaches -- Transfer Learning Using Twitter Data for Improving Sentiment Classification of Turkish Political News -- A Fully Semantic Approach to Large Scale Text Categorization -- Emotion Analysis on Turkish Texts -- A Comparative Study to Determine the Effective Window Size of Turkish Word Sense Disambiguation Systems -- Section 4: Computer Vision -- Eyes Detection Combined Feature Extraction and Mouth Information -- Depth From Moving Apertures -- Score Level Fusion for Face-Iris Multimodal Biometric System -- Feature Selection for Enhanced 3D Facial Expression Recognition Based On Varying Feature Point Distances -- Section 5: Data and Web Engineering -- DAPNA: An Architectural Framework for Data Processing Networks -- Crescent: A Byzantine Fault Tolerant Delivery Framework for Durable Composite Web Services -- Morphological Document Recovery in HSI space -- Ontological Approach to Data Warehouse Source Integration -- Adaptive Oversampling with Active Learning in Imbalanced Data Classication -- Section 6: Wireless Sensor Networks -- Energy-Aware Distributed Hash Table-based Bootstrapping Protocol for Randomly Deployed Heterogeneous Wireless Sensor Networks -- Sensor-Activity Relevance in Human Activity Recognition with Wearable Motion Sensors and Mutual Information Criterion -- Routing Emergency Evacuees with Cognitive Packet Networks -- Detection and Evaluation of Physical Therapy Exercises by Dynamic Time Warping Using Wearable Motion Sensor Units -- Section 7: Network Security, Data Integrity and Privacy -- Commutative Matrix-Based Diffie-Hellman-Like Key-Exchange Protocol -- Anonymity in Multi-Instance Micro-Data Publication -- Homomorphic Minimum Bandwidth Repairing Codes -- Recreating a Large-scale BGP Incident in a Realistic Environment -- Uneven Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor Networks -- NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem -- Towards Visualizing mobile network data -- Infrastructure for Detecting Android Malware -- NEMESYS: First Year Project Experience in Telecom Italia Information Technology -- Android Security, Pitfalls, Lessons Learned and BYOD -- Mobile Network Threat Analysis & MNO Positioning -- Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach. | |
520 | _aBased on a rigorous selection from 67 proposals coming from across the world, this volume includes some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. The book will provide the reader with timely access to innovative research from many different areas of the world where advances in computing and communications are created. . | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer organization. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aInformation Systems Applications (incl. Internet). |
650 | 2 | 4 | _aComputer Systems Organization and Communication Networks. |
700 | 1 |
_aGelenbe, Erol. _eeditor. |
|
700 | 1 |
_aLent, Ricardo. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319016030 |
830 | 0 |
_aLecture Notes in Electrical Engineering, _x1876-1100 ; _v264 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-01604-7 |
912 | _aZDB-2-SCS | ||
942 | _cEBK | ||
999 |
_c55775 _d55775 |