menu
{ "item_title" : "Computer and Information Science", "item_author" : [" Roger Lee "], "item_description" : "A New Method of Breakpoint Connection for Human Skeleton Image.- Insult Detection in Social Network Comments using Possibilistic based Fusion Approach.- What Information in Software Historical Repositories Do We Need to Support Software Maintenance Tasks? An Approach Based on Topic Model .- Evaluation Framework for the Dependability of Ubiquitous Learning Environment.- Improving Content Recommendation in Social Streams via Interest Model.- Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks.- Live Migration Performance Modelling for Virtual Machines with Resizable Memory.- A Heuristic Algorithm forWorkflow-Based Job Scheduling in Decentralized Distributed Systems with Heterogeneous Resources.- Novel Data Integrity Verification Schemes in Cloud Storage.- Generation of Assurance Cases For Medical Devices.- A Survey on the Categories of Service Value/Quality/Satisfactory Factors.- Effective Domain Modeling for Mobile Business AHMS (Adaptive Human Management Systems) Requirements.", "item_img_path" : "https://covers3.booksamillion.com/covers/bam/3/31/910/508/3319105086_b.jpg", "price_data" : { "retail_price" : "109.99", "online_price" : "109.99", "our_price" : "109.99", "club_price" : "109.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Computer and Information Science|Roger Lee

Computer and Information Science

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

A New Method of Breakpoint Connection for Human Skeleton Image.- Insult Detection in Social Network Comments using Possibilistic based Fusion Approach.- What Information in Software Historical Repositories Do We Need to Support Software Maintenance Tasks? An Approach Based on Topic Model .- Evaluation Framework for the Dependability of Ubiquitous Learning Environment.- Improving Content Recommendation in Social Streams via Interest Model.- Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks.- Live Migration Performance Modelling for Virtual Machines with Resizable Memory.- A Heuristic Algorithm forWorkflow-Based Job Scheduling in Decentralized Distributed Systems with Heterogeneous Resources.- Novel Data Integrity Verification Schemes in Cloud Storage.- Generation of Assurance Cases For Medical Devices.- A Survey on the Categories of Service Value/Quality/Satisfactory Factors.- Effective Domain Modeling for Mobile Business AHMS (Adaptive Human Management Systems) Requirements.

This item is Non-Returnable

Details

  • ISBN-13: 9783319105086
  • ISBN-10: 3319105086
  • Publisher: Springer
  • Publish Date: October 2014
  • Dimensions: 9.21 x 6.14 x 0.56 inches
  • Shipping Weight: 1.08 pounds
  • Page Count: 209

Related Categories

You May Also Like...

    1

BAM Customer Reviews