000 07864nam a22005775i 4500
001 978-3-662-45237-0
003 DE-He213
005 20200421111157.0
007 cr nn 008mamaa
008 141025s2014 gw | s |||| 0|eng d
020 _a9783662452370
_9978-3-662-45237-0
024 7 _a10.1007/978-3-662-45237-0
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM075000
_2bisacsh
082 0 4 _a004.6
_223
245 1 0 _aComputer Information Systems and Industrial Management
_h[electronic resource] :
_b13th IFIP TC8 International Conference, CISIM 2014, Ho Chi Minh City, Vietnam, November 5-7, 2014. Proceedings /
_cedited by Khalid Saeed, V�aclav Sn�ašel.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2014.
300 _aXVIII, 702 p. 313 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v8838
505 0 _aProcessing Collective Knowledge - Conflict Resolution and Integration Aspects -- How to Store and Process Big Data: Are Today's Databases Sufficient -- A New Contention Management Technique for Obstruction Free Transactional Memory -- Evolutionary Algorithm for Decision Tree Induction -- A New Method for Mining High Average Utility Itemsets -- Spectral Clustering Based on Analysis of Eigenvector Properties -- Applying Recurrent Fuzzy Neural Network to Predict the Runoff of Srepok River -- Comparison of Chaos Driven PSO and Differential Evolution on the Selected PID Tuning Problem -- Improving Rule Selection from Robot Soccer Strategy with Sub strategies -- Novel Ranking Methods Applied to Complex Membership Determination Problems -- Combination of Self Organizing Maps and Growing Neural Gas -- A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud -- On the Comparison of the Keystroke Dynamics Databases -- Influence of Eye Diseases on the Retina Pattern Recognition -- Pupil and Iris Detection Algorithm for Near-Infrared Capture Devices -- Query Selectivity Estimation Based on Improved V-optimal Histogram by Introducing Information about Distribution of Boundaries of Range Query Conditions -- Dynamic Centrality for Directed Co-author Network with Context -- Towards a Conceptual Search for Vietnamese Legal Text -- A Vietnamese Question Answering System in Vietnam's Legal Documents -- An Inner-Enterprise Wiki System (IWkS) Integrated with an Expert Finding Mechanism for Lesson-Learned Knowledge Accumulation in Product Design -- Movie Recommendation Using OLAP and Multidimensional Data Model -- Decision Trees and Their Families in Imbalanced Pattern Recognition: Recognition with and without Rejection -- An Approach for Integrating Multidimensional Database into Context-Aware Recommender System -- Vietnamese Sentence Similarity Based on Concepts -- Materialized View Construction Based on Clustering Technique -- Big Data Spectra Analysis Using Analytical Programming and Random Decision Forests -- Man-Machine Interaction Improvement by Means of Automatic Human Personality Identification -- via RODOS: Monitoring and Visualisation of Current Traffic Situation on Highways -- Computation of Swing-up Signal for Inverted Pendulum Using Dynamic Optimization -- System and Application Scenarios for Disaster Management Processes, the Rainfall-Runoff Model Case Study -- An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse -- Abbreviation Method for Some Jointed Relations in Displaying Genealogy -- Proposing a Novel Architecture of Script Component to Incorporate the Scripting Language Support in SCADA Systems -- Agent-Based Context Management for Service-Oriented Environments -- Event Based Approaches for Solving Multi-mode Resource Constraints Project Scheduling Problem -- Non-cooperative Games Involving Type-2 Fuzzy Uncertainty: An Approach -- Joining Concept's Based Fuzzy Cognitive Map Model with Moving Window Technique for Time Series Modeling -- Time Series Modeling with Fuzzy Cognitive Maps: Simplification Strategies-The Case of a Posteriori Removal of Nodes and Weights -- An Effective Initialization for ASM-Based Methods -- A Multiple Refinement Approach in Abstraction Model Checking -- Chaos Driven Particle Swarm Optimization with Basic Particle Performance Evaluation - An Initial Study -- Chaos Powered Grammatical Evolution -- Network Anomaly Detection Using Parameterized Entropy -- Universal Central Control of Home Appliances as an Expanding Element of the Smart Home Concepts -- An Off-the-Shelf Platform for Automatic and Interactive Text Messaging Using Short Message Service -- Application of PIL Approach for Automated Transportation Center -- A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring -- Analysis of Social Influence and Information Dissemination in Social Media: The Case of Twitter -- Multi-criteria Route Planning in Bus Network -- Pattern Recognition and Image Processing Enhanced LBP-Based Face Recognition System Using a Heuristic Approach for Searching Weight Set -- A Local Gaussian Filter and Adaptive Morphology as Tools for Completing Partially Discontinuous Curves -- Subspaces Clustering Approach to Lossy Image Compression -- An Impact of the User and Time Parameters to Sequence Alignment Methods for Process Mining -- An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature -- Grasping Action for Impaired Vision Action Using HC2D Barcode Technology -- Hardware Approach for Generating b-detectors by Immune-Based Algorithms -- Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges -- Protection Profile for Secure Sensitive Information System on Mobile Devices -- Implicit and Explicit Certificates-Based Encryption Scheme -- Malware Behavior Modeling with Colored Petri Nets -- A Proposal of Algorithm for Web Applications Cyber Attack Detection -- Semantic Set Analysis for Malware Detection.
520 _aThis book constitutes the proceedings of the 13th IFIP TC 8 International Conference on Computer Information Systems and Industrial Management, CISIM 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 60 paper presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: algorithms; biometrics and biometrics applications; data analysis and information retrieval; industrial management and other applications; modelling and optimization; networking; pattern recognition and image processing; and various aspects of computer security.
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aSoftware engineering.
650 0 _aAlgorithms.
650 0 _aInformation storage and retrieval.
650 0 _aPattern recognition.
650 1 4 _aComputer Science.
650 2 4 _aComputer Communication Networks.
650 2 4 _aInformation Systems Applications (incl. Internet).
650 2 4 _aPattern Recognition.
650 2 4 _aSoftware Engineering.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aInformation Storage and Retrieval.
700 1 _aSaeed, Khalid.
_eeditor.
700 1 _aSn�ašel, V�aclav.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783662452363
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v8838
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-662-45237-0
912 _aZDB-2-SCS
912 _aZDB-2-LNC
942 _cEBK
999 _c53588
_d53588