|
|
|
|
LEADER |
04022nam a22005055i 4500 |
001 |
978-3-540-70560-4 |
003 |
DE-He213 |
005 |
20151204142446.0 |
007 |
cr nn 008mamaa |
008 |
100301s2008 gw | s |||| 0|eng d |
020 |
|
|
|a 9783540705604
|9 978-3-540-70560-4
|
024 |
7 |
|
|a 10.1007/978-3-540-70560-4
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TA329-348
|
050 |
|
4 |
|a TA640-643
|
072 |
|
7 |
|a TBJ
|2 bicssc
|
072 |
|
7 |
|a MAT003000
|2 bisacsh
|
082 |
0 |
4 |
|a 519
|2 23
|
245 |
1 |
0 |
|a Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing
|h [electronic resource] /
|c edited by Roger Lee.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2008.
|
300 |
|
|
|a XIV, 260 p. 110 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Studies in Computational Intelligence,
|x 1860-949X ;
|v 149
|
505 |
0 |
|
|a Stopping Criterion Selection for Efficient Semi-supervised Time Series Classification -- Enhancing the Blockage of Spam over Internet Telephony (SPIT) Using Adaptive PMG Algorithm -- Spatio-temporal Facial Expression Recognition Using Optical Flow and HMM -- An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction -- Challenges Relating to RFID Implementation within the Electronic Supply Chain Management - A Practical Approach -- Design and Implementation of Clustering File Backup Server Using File Fingerprint -- Aspect Oriented Testing Frameworks for Embedded Software -- Analysis on Malicious Peer’s Behavior of the P2P Trust Resource Chain Model -- Information Technology Service Management: A Thailand Perspective -- A New Artificial Immune System for the Detection of Abnormal Behaviour -- Markov Chain Analysis of Genetic Algorithms Applied to Fitness Functions Perturbed by Multiple Sources of Additive Noise -- A Security Supervision System for Hybrid Networks -- Cost Minimization in Service Systems Using Particle Swarm Optimization -- MS2Web: Applying MDA and SOA to Web Services -- Security Analysis of One Verifiable Encryption Scheme -- Proactive Fault Management with Virtualization for Software Aging -- A Preemption Control Technique for System Energy Minimization of Weakly Hard Real-Time Systems -- Text Classification by Relearning and Ensemble Computation -- Analysis of Agents’ Cooperation in RoboCupRescue Simulation -- A Data Mining Approach for Predicting Reliable Path for Congestion Free Routing Using Self-motivated Neural Network -- A Formal Specification of UML Class and State Diagrams.
|
520 |
|
|
|a The 9th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, held in Phuket Thailand on August 6 – 8, 2008 is aimed at bringing together researchers and scientist, businessmen and entrepreneurs, teachers and students to discuss the numerous fields of computer science, and to share ideas and information in a meaningful way. This publication captures 20 of the conference’s most promising papers, and we impatiently await the important contributions that we know these authors will bring to the field.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Applied mathematics.
|
650 |
|
0 |
|a Engineering mathematics.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Appl.Mathematics/Computational Methods of Engineering.
|
650 |
2 |
4 |
|a Artificial Intelligence (incl. Robotics).
|
650 |
2 |
4 |
|a Software Engineering.
|
700 |
1 |
|
|a Lee, Roger.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783540705598
|
830 |
|
0 |
|a Studies in Computational Intelligence,
|x 1860-949X ;
|v 149
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-540-70560-4
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|