Information Sciences and Systems 2013 Proceedings of the 28th International Symposium on Computer and Information Sciences /

Based on a rigorous selection from 67 proposals coming from across the world, this volume includes some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. The book will provide the reader with timely access to innovative researc...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Gelenbe, Erol (Επιμελητής έκδοσης), Lent, Ricardo (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2013.
Σειρά:Lecture Notes in Electrical Engineering, 264
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Section 1: Smart Algorithms
  • Adaptive Curve Tailoring
  • Regularizing Soft Decision Trees
  • A Simple Yet Fast Algorithm for the Closest-Pair Problem Using Sorted Projections on Multi-dimensions
  • DARWIN - A Genetic Algorithm Language
  • Distributed Selfish Algorithms for the Max-Cut game
  • Section 2: Analysis, Modelling and Optimisation
  • Distributed Binary Consensus in Dynamic Networks
  • Computing bounds of the MTTF for a set of Markov Chains
  • Analysing and Predicting Patient Arrival Times in Hospitals using Hidden Markov Models
  • Optimal Behaviour of Smart Wireless Users
  • Hyper-heuristics for Performance Optimization of Simultaneous Multithreaded Processors
  • A Model of Speculative Parallel Scheduling in Networks of Unreliable Sensors
  • Energy-Aware Admission Control for Wired Networks
  • Section 3: Computational Linguistics
  • Named Entity Recognition in Turkish with Bayesian Learning and Hybrid Approaches
  • Transfer Learning Using Twitter Data for Improving Sentiment Classification of Turkish Political News
  • A Fully Semantic Approach to Large Scale Text Categorization
  • Emotion Analysis on Turkish Texts
  • A Comparative Study to Determine the Effective Window Size of Turkish Word Sense Disambiguation Systems
  • Section 4: Computer Vision
  • Eyes Detection Combined Feature Extraction and Mouth Information
  • Depth From Moving Apertures
  • Score Level Fusion for Face-Iris Multimodal Biometric System
  • Feature Selection for Enhanced 3D Facial Expression Recognition Based On Varying Feature Point Distances
  • Section 5: Data and Web Engineering
  • DAPNA: An Architectural Framework for Data Processing Networks
  • Crescent: A Byzantine Fault Tolerant Delivery Framework for Durable Composite Web Services
  • Morphological Document Recovery in HSI space
  • Ontological Approach to Data Warehouse Source Integration
  • Adaptive Oversampling with Active Learning in Imbalanced Data Classication
  • Section 6: Wireless Sensor Networks
  • Energy-Aware Distributed Hash Table-based Bootstrapping Protocol for Randomly Deployed Heterogeneous Wireless Sensor Networks
  • Sensor-Activity Relevance in Human Activity Recognition with Wearable Motion Sensors and Mutual Information Criterion
  • Routing Emergency Evacuees with Cognitive Packet Networks
  • Detection and Evaluation of Physical Therapy Exercises by Dynamic Time Warping Using Wearable Motion Sensor Units
  • Section 7: Network Security, Data Integrity and Privacy
  • Commutative Matrix-Based Diffie-Hellman-Like Key-Exchange Protocol
  • Anonymity in Multi-Instance Micro-Data Publication
  • Homomorphic Minimum Bandwidth Repairing Codes
  • Recreating a Large-scale BGP Incident in a Realistic Environment
  • Uneven Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor Networks
  • NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem
  • Towards Visualizing mobile network data
  • Infrastructure for Detecting Android Malware
  • NEMESYS: First Year Project Experience in Telecom Italia Information Technology
  • Android Security, Pitfalls, Lessons Learned and BYOD
  • Mobile Network Threat Analysis & MNO Positioning
  • Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach.