Computer and Information Sciences II : 26th International Symposium on Computer and Information Sciences
Other Available Formats
Overview
Search Computing: Addressing Complex Search on the Web.- Hypergraph-Theoretic Partitioning Models for Parallel Web Crawling.- Web Service Discovery: A Service Oriented, Peer-to-Peer Approach with Categorization.- Finding High Order Dependencies in Data.- Heuristic Algorithms for Real-Time Unsplittable Data Dissemination Problem.- Automatic Categorization of Ottoman Literary Texts by Poet and Time Period.- An Empirical Study About Search-Based Refactoring Using Alternative Multiple and Population-Based Search Techniques.- Unsupervised Morphological Analysis Using Tries.- A Novel Approach to Morphological Disambiguation for Turkish.- A Small Footprint Hybrid Statistical and Unit Selection Text-To-Speech Synthesis System for Turkish.- Enhancing Incremental Feature Subset Selection in High-Dimensional Databases by Adding a Backward Step.- Memory Resident Parallel Inverted Index Construction.- Dynamic Programming with Ant Colony Optimization Metaheuristic for Optimization of Distributed Database Queries.- Energy Cost Model for Frequent Item Set Discovery in Unstructured P2P Networks.- Towards a Fairer Energy Consumption in Wireless Ad Hoc Networks.- Energy Efficient Resource Allocation Strategy for Cloud Data Centers.- A Survey of Recent Work on Energy Harvesting Networks.- Distributed Energy-Aware Routing of Traffic.- A Distributed Scheme to Detect Wormhole Attacks in Mobile Wireless Sensor Networks.- Cross-Layer Optimization with Two-Group Loading for Ad-Hoc Networks.- Algorithms for Sink Mobility in Wireless Sensor Networks to Improve Network Lifetime.- A Hybrid Interference-Aware Multi-Path Routing Protocol for Mobile Ad Hoc Network.- Providing Automated Actions in Wireless Multimedia Sensor Networks via Active Rules.- File Transfer Application for Sharing Femto Access.- Time Parallel Simulation and hv-Monotonicity.- A Prediction Based Mobility Extension for eHIP Protocol.- Performance Evaluation of a Multiuser Interactive Networking System - A Comparison of Modeling Methods.- Auction-Based Admission Control for Self-Aware Networks.- Complexity Reduction for Multi-hop Network End-to-end Delay Minimization.- Performance Improvement of an Optical Network Providing.- G-Network Modelling Based Abnormal Pathway Detection in Gene Regulatory Networks.- DeDALO: A Framework for Distributed Systems Dependencies Discovery and Analysis.- A Content-Based Social Network Study of Evliya Celebi's Seyahatname-Bitlis Section.- On the Parameterised Complexity of Learning Patterns.- Using SVM to Avoid Humans - A Case of a Small Autonomous Mobile Robot in an Office.- Palmprint Verification Using Sift Majority Voting.- 3D Object Exploration using Viewpoint and Mesh Saliency Entropies.- Boundary Descriptors for Visual Speech Recognition.- Semi-Automatic Adaptation of High-Polygon Wireframe Face Models Through Inverse Perspective Projection.- A Fuzzy Metric in GPUs: Fast and Efficient Method for the Impulsive Image Noise Removal.- Improved Secret Image Sharing Method by Encoding Shared Values with Authentication Bits.- Intelligent Navigation Systems for Building Evacuation.- Automatic Population of Scenarios with Augmented Virtuality.- Support for Resilient Communications in Future Disaster Management.- Agent-Based Modeling of a Price Information Trading Business.- Modeling Lane Preferences in Agent-Based Multi-Lane Highway Simulation.- Chromosome Coding Methods in Genetic Algorithm for Path Planning of Mobile Robots.- Client-Based CardSpace-OpenID Interoperation.- An Artificial Immune Classifier Using Pseudo-Ellipsoid Rules.- Contextually Learnt Detection of Unusual Motion-Based Behaviour in Crowded Public Spaces.- Grid Security Loopholes with Proposed Countermeasures.- Detection of Broken Link Fraud in DSDV Routing.- Strategies for Risk Facing in Work Environments.- Numerical Integration Methods for Simulation of Mass-Spring-Damper Systems.- Multi-layered Simulation Architecture: A Practical Approach.- Variable Threshold Based Cutting Method for Vi
This item is Non-Returnable
Customers Also Bought
Details
- ISBN-13: 9781447158103
- ISBN-10: 1447158105
- Publisher: Springer
- Publish Date: November 2013
- Dimensions: 9.21 x 6.14 x 1.21 inches
- Shipping Weight: 1.83 pounds
- Page Count: 586
Related Categories
