000 | 03798nam a22004695i 4500 | ||
---|---|---|---|
001 | 978-3-319-10509-3 | ||
003 | DE-He213 | ||
005 | 20200421111205.0 | ||
007 | cr nn 008mamaa | ||
008 | 140922s2015 gw | s |||| 0|eng d | ||
020 |
_a9783319105093 _9978-3-319-10509-3 |
||
024 | 7 |
_a10.1007/978-3-319-10509-3 _2doi |
|
050 | 4 | _aQ342 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aComputer and Information Science _h[electronic resource] / _cedited by Roger Lee. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aXIII, 209 p. 107 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aStudies in Computational Intelligence, _x1860-949X ; _v566 |
|
505 | 0 | _aA New Method of Breakpoint Connection for Human Skeleton Image -- Insult Detection in Social Network Comments using Possibilistic based Fusion Approach -- What Information in Software Historical Repositories Do We Need to Support Software Maintenance Tasks? An Approach Based on Topic Model -- Evaluation Framework for the Dependability of Ubiquitous Learning Environment -- Improving Content Recommendation in Social Streams via Interest Model -- Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks -- Live Migration Performance Modelling for Virtual Machines with Resizable Memory -- A Heuristic Algorithm forWorkflow-Based Job Scheduling in Decentralized Distributed Systems with Heterogeneous Resources -- Novel Data Integrity Verification Schemes in Cloud Storage -- Generation of Assurance Cases For Medical Devices -- A Survey on the Categories of Service Value/Quality/Satisfactory Factors -- Effective Domain Modeling for Mobile Business AHMS (Adaptive Human Management Systems) Requirements. | |
520 | _aThis edited book presents scientific results of the 13th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2014) which was held on June 4-6, 2014 in Taiyuan, China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 14 of the conference's most promising papers, and we impatiently await the important contributions that we know these authors will bring to the field of computer and information science. | ||
650 | 0 | _aEngineering. | |
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aComputational intelligence. | |
650 | 1 | 4 | _aEngineering. |
650 | 2 | 4 | _aComputational Intelligence. |
650 | 2 | 4 | _aArtificial Intelligence (incl. Robotics). |
700 | 1 |
_aLee, Roger. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319105086 |
830 | 0 |
_aStudies in Computational Intelligence, _x1860-949X ; _v566 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-10509-3 |
912 | _aZDB-2-ENG | ||
942 | _cEBK | ||
999 |
_c54091 _d54091 |