|
|
|
|
LEADER |
03799nam a22004575i 4500 |
001 |
978-3-319-10509-3 |
003 |
DE-He213 |
005 |
20151103121133.0 |
007 |
cr nn 008mamaa |
008 |
140922s2015 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319105093
|9 978-3-319-10509-3
|
024 |
7 |
|
|a 10.1007/978-3-319-10509-3
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a Q342
|
072 |
|
7 |
|a UYQ
|2 bicssc
|
072 |
|
7 |
|a COM004000
|2 bisacsh
|
082 |
0 |
4 |
|a 006.3
|2 23
|
245 |
1 |
0 |
|a Computer and Information Science
|h [electronic resource] /
|c edited by Roger Lee.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2015.
|
300 |
|
|
|a XIII, 209 p. 107 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Studies in Computational Intelligence,
|x 1860-949X ;
|v 566
|
505 |
0 |
|
|a A New Method of Breakpoint Connection for Human Skeleton Image -- Insult Detection in Social Network Comments using Possibilistic based Fusion Approach -- What Information in Software Historical Repositories Do We Need to Support Software Maintenance Tasks? An Approach Based on Topic Model -- Evaluation Framework for the Dependability of Ubiquitous Learning Environment -- Improving Content Recommendation in Social Streams via Interest Model -- Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks -- Live Migration Performance Modelling for Virtual Machines with Resizable Memory -- A Heuristic Algorithm forWorkflow-Based Job Scheduling in Decentralized Distributed Systems with Heterogeneous Resources -- Novel Data Integrity Verification Schemes in Cloud Storage -- Generation of Assurance Cases For Medical Devices -- A Survey on the Categories of Service Value/Quality/Satisfactory Factors -- Effective Domain Modeling for Mobile Business AHMS (Adaptive Human Management Systems) Requirements.
|
520 |
|
|
|a This edited book presents scientific results of the 13th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2014) which was held on June 4-6, 2014 in Taiyuan, China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 14 of the conference’s most promising papers, and we impatiently await the important contributions that we know these authors will bring to the field of computer and information science.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Computational intelligence.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Computational Intelligence.
|
650 |
2 |
4 |
|a Artificial Intelligence (incl. Robotics).
|
700 |
1 |
|
|a Lee, Roger.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319105086
|
830 |
|
0 |
|a Studies in Computational Intelligence,
|x 1860-949X ;
|v 566
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-319-10509-3
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|