Information Sciences and Systems 2013 : Proceedings of the 28th International Symposium on Computer and Information Sciences (Lecture Notes in Electrical Engineering)

個数:

Information Sciences and Systems 2013 : Proceedings of the 28th International Symposium on Computer and Information Sciences (Lecture Notes in Electrical Engineering)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 440 p.
  • 言語 ENG
  • 商品コード 9783319377643
  • DDC分類 004

Full Description

Based on a rigorous selection from 58 proposals coming from across the world, this volume will include some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. The book will offer the reader with a timely access to innovative research from many different areas of the world where advances in computing and communications are created.

Contents

Section 1: Smart Algorithms.- Adaptive Curve Tailoring.- Regularizing Soft Decision Trees.- A Simple Yet Fast Algorithm for the Closest-Pair Problem Using Sorted Projections on Multi-dimensions.- DARWIN - A Genetic Algorithm Language.- Distributed Selfish Algorithms for the Max-Cut game.- Section 2: Analysis, Modelling and Optimisation.- Distributed Binary Consensus in Dynamic Networks.- Computing bounds of the MTTF for a set of Markov Chains.- Analysing and Predicting Patient Arrival Times in Hospitals using Hidden Markov Models.- Optimal Behaviour of Smart Wireless Users.- Hyper-heuristics for Performance Optimization of Simultaneous Multithreaded Processors.- A Model of Speculative Parallel Scheduling in Networks of Unreliable Sensors.- Energy-Aware Admission Control for Wired Networks.- Section 3: Computational Linguistics.- Named Entity Recognition in Turkish with Bayesian Learning and Hybrid Approaches.- Transfer Learning Using Twitter Data for Improving Sentiment Classification of Turkish Political News.- A Fully Semantic Approach to Large Scale Text Categorization.- Emotion Analysis on Turkish Texts.- A Comparative Study to Determine the Effective Window Size of Turkish Word Sense Disambiguation Systems.- Section 4: Computer Vision.- Eyes Detection Combined Feature Extraction and Mouth Information.- Depth From Moving Apertures.- Score Level Fusion for Face-Iris Multimodal Biometric System.- Feature Selection for Enhanced 3D Facial Expression Recognition Based On Varying Feature Point Distances.- Section 5: Data and Web Engineering.- DAPNA: An Architectural Framework for Data Processing Networks.- Crescent: A Byzantine Fault Tolerant Delivery Framework for Durable Composite Web Services.- Morphological Document Recovery in HSI space.- Ontological Approach to Data Warehouse Source Integration.- Adaptive Oversampling with Active Learning in Imbalanced Data Classication.- Section 6: Wireless Sensor Networks.- Energy-Aware Distributed Hash Table-based Bootstrapping Protocol for Randomly Deployed Heterogeneous Wireless Sensor Networks.- Sensor-Activity Relevance in Human Activity Recognition with Wearable Motion Sensors and Mutual Information Criterion.- Routing Emergency Evacuees with Cognitive Packet Networks.- Detection and Evaluation of Physical Therapy Exercises by Dynamic Time Warping Using Wearable Motion Sensor Units.- Section 7: Network Security, Data Integrity and Privacy.- Commutative Matrix-Based Diffie-Hellman-Like Key-Exchange Protocol.- Anonymity in Multi-Instance Micro-Data Publication.- Homomorphic Minimum Bandwidth Repairing Codes.- Recreating a Large-scale BGP Incident in a Realistic Environment.- Uneven Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor Networks.- NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem.- Towards Visualizing mobile network data.- Infrastructure for Detecting Android Malware.- NEMESYS: First Year Project Experience in Telecom Italia Information Technology.- Android Security, Pitfalls, Lessons Learned and BYOD.- Mobile Network Threat Analysis & MNO Positioning.- Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach.

最近チェックした商品