Buch, Englisch, 702 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 10701 g
Reihe: Information Systems and Applications, incl. Internet/Web, and HCI
13th IFIP TC 8 International Conference, CISIM 2014, Ho Chi Minh City, Vietnam, November 5-7, 2014, Proceedings
Buch, Englisch, 702 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 10701 g
Reihe: Information Systems and Applications, incl. Internet/Web, and HCI
ISBN: 978-3-662-45236-3
Verlag: Springer
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Computeranwendungen in Wissenschaft & Technologie
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Automatische Datenerfassung, Datenanalyse
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Information Retrieval
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Algorithmen & Datenstrukturen
- Technische Wissenschaften Technik Allgemein Computeranwendungen in der Technik
- Wirtschaftswissenschaften Betriebswirtschaft Wirtschaftsinformatik, SAP, IT-Management
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz Mustererkennung, Biometrik
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Technische Wissenschaften Sonstige Technologien | Angewandte Technik Signalverarbeitung, Bildverarbeitung, Scanning
- Mathematik | Informatik EDV | Informatik Angewandte Informatik Wirtschaftsinformatik
- Mathematik | Informatik EDV | Informatik Informatik Bildsignalverarbeitung
Weitere Infos & Material
Processing Collective Knowledge – Conflict Resolution and Integration Aspects.- How to Store and Process Big Data: Are Today’s Databases Sufficient.- A New Contention Management Technique for Obstruction Free Transactional Memory.- Evolutionary Algorithm for Decision Tree Induction.- A New Method for Mining High Average Utility Itemsets.- Spectral Clustering Based on Analysis of Eigenvector Properties.- Applying Recurrent Fuzzy Neural Network to Predict the Runoff of Srepok River.- Comparison of Chaos Driven PSO and Differential Evolution on the Selected PID Tuning Problem.- Improving Rule Selection from Robot Soccer Strategy with Sub strategies.- Novel Ranking Methods Applied to Complex Membership Determination Problems.- Combination of Self Organizing Maps and Growing Neural Gas.- A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud.- On the Comparison of the Keystroke Dynamics Databases.- Influence of Eye Diseases on the Retina Pattern Recognition.- Pupil and Iris Detection Algorithm for Near-Infrared Capture Devices.- Query Selectivity Estimation Based on Improved V-optimal Histogram by Introducing Information about Distribution of Boundaries of Range Query Conditions.- Dynamic Centrality for Directed Co-author Network with Context.- Towards a Conceptual Search for Vietnamese Legal Text.- A Vietnamese Question Answering System in Vietnam’s Legal Documents.- An Inner-Enterprise Wiki System (IWkS) Integrated with an Expert Finding Mechanism for Lesson-Learned Knowledge Accumulation in Product Design.- Movie Recommendation Using OLAP and Multidimensional Data Model.- Decision Trees and Their Families in Imbalanced Pattern Recognition: Recognition with and without Rejection.- An Approach for Integrating Multidimensional Database into Context-Aware Recommender System.- Vietnamese Sentence Similarity Based on Concepts.- Materialized View Construction Based on Clustering Technique.- Big Data Spectra Analysis UsingAnalytical Programming and Random Decision Forests.- Man-Machine Interaction Improvement by Means of Automatic Human Personality Identification.- via RODOS: Monitoring and Visualisation of Current Traffic Situation on Highways.- Computation of Swing-up Signal for Inverted Pendulum Using Dynamic Optimization.- System and Application Scenarios for Disaster Management Processes, the Rainfall-Runoff Model Case Study.- An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse.- Abbreviation Method for Some Jointed Relations in Displaying Genealogy.- Proposing a Novel Architecture of Script Component to Incorporate the Scripting Language Support in SCADA Systems.- Agent-Based Context Management for Service-Oriented Environments.- Event Based Approaches for Solving Multi-mode Resource Constraints Project Scheduling Problem.- Non-cooperative Games Involving Type-2 Fuzzy Uncertainty: An Approach.- Joining Concept’s Based Fuzzy Cognitive Map Model with Moving Window Technique for Time Series Modeling.- Time Series Modeling with Fuzzy Cognitive Maps: Simplification Strategies-The Case of a Posteriori Removal of Nodes and Weights.- An Effective Initialization for ASM-Based Methods.- A Multiple Refinement Approach in Abstraction Model Checking.- Chaos Driven Particle Swarm Optimization with Basic Particle Performance Evaluation – An Initial Study.- Chaos Powered Grammatical Evolution.- Network Anomaly Detection Using Parameterized Entropy.- Universal Central Control of Home Appliances as an Expanding Element of the Smart Home Concepts.- An Off-the-Shelf Platform for Automatic and Interactive Text Messaging Using Short Message Service.- Application of PIL Approach for Automated Transportation Center.- A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring.- Analysis of Social Influence and Information Dissemination in Social Media: The Case of Twitter.- Multi–criteriaRoute Planning in Bus Network.- Pattern Recognition and Image Processing Enhanced LBP-Based Face Recognition System Using a Heuristic Approach for Searching Weight Set.- A Local Gaussian Filter and Adaptive Morphology as Tools for Completing Partially Discontinuous Curves.- Subspaces Clustering Approach to Lossy Image Compression.- An Impact of the User and Time Parameters to Sequence Alignment Methods for Process Mining.- An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature.- Grasping Action for Impaired Vision Action Using HC2D Barcode Technology.- Hardware Approach for Generating b-detectors by Immune-Based Algorithms.- Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges.- Protection Profile for Secure Sensitive Information System on Mobile Devices.- Implicit and Explicit Certificates-Based Encryption Scheme.- Malware Behavior Modeling with Colored Petri Nets.- A Proposal of Algorithm for Web Applications Cyber Attack Detection.- Semantic Set Analysis for Malware Detection.