|
|
|
|
LEADER |
05196nam a22004575i 4500 |
001 |
978-3-642-21375-5 |
003 |
DE-He213 |
005 |
20151125211758.0 |
007 |
cr nn 008mamaa |
008 |
110629s2011 gw | s |||| 0|eng d |
020 |
|
|
|a 9783642213755
|9 978-3-642-21375-5
|
024 |
7 |
|
|a 10.1007/978-3-642-21375-5
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a Q342
|
072 |
|
7 |
|a UYQ
|2 bicssc
|
072 |
|
7 |
|a COM004000
|2 bisacsh
|
082 |
0 |
4 |
|a 006.3
|2 23
|
245 |
1 |
0 |
|a Computers,Networks, Systems, and Industrial Engineering 2011
|h [electronic resource] /
|c edited by Roger Lee.
|
264 |
|
1 |
|a Berlin, Heidelberg :
|b Springer Berlin Heidelberg,
|c 2011.
|
300 |
|
|
|a XVI, 268 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Studies in Computational Intelligence,
|x 1860-949X ;
|v 365
|
505 |
0 |
|
|a Using Dominating sets with 2-Hop Neighborhood Information to Improve the Ad-Hoc On-demand Distance Vector -- Dynamically Controlling Retransmission Mechanism for Analysing QoS Parameters of IEEE 802.11 Networks -- A Non-Functional Requirements Traceability Management Method Based on Architectural Patterns -- Performance of Non-Coherent Detectors for Ultra Wide Band Short Range -- Radar in Automobile Applications -- Flexible Modeling Language in Qualitative Simulation -- Bridging Enterprise Architecture Requirements to ArchiMate -- Non-Coherent Logarithmic Detector Performance in Log-Normal and Weibull Clutter Environment (UWB Automotive Application) -- A Regional matchmaking Technique for Improving Efficiency in Volunteer Computing Environment -- An Intelligent Multi-Agent Model for Resource Virtualization: Supporting Social Media Service in cloud computing -- Compiler-assisted Maximum Stack Usage Measurement Technique for Efficient Multi-threading in Memory-limited Embedded Systems -- Fault-Tolerant Clock Synchronization for Time-Triggered Wireless Sensor Network -- A Preliminary Empirical Analysis of Mobile Agent-based P2P File Retrieval -- An Approach to Sharing Business Process Models in Agile-style Global Software Engineering -- Modeling for Gesture Set Design Toward Realizing Effective Human-Vehicle Interface -- A Power Effiency based Delay Constraints Mechanism for Mobile WiMAX Systems -- An Adaptive Scheduling Algorithm for Scalable Peer-To-Peer Streaming -- Enterprise Data Loss Prevention System Having a Function of Coping with Civil Suits -- Optimal sizing of hybrid wind-PV-tide system -- A Smart Web-Sensor Based on IEEE 1451 and Web-Service Using a Gas Sensor -- CC Based Analysis Scheme for Evaluation Scope Models -- Integrating User-generated Content and Spatial Dat into Web GIS For Disaster History -- Frameworks for u-Health Bio Signal Controller.
|
520 |
|
|
|a The series "Studies in Computational Intelligence" (SCI) publishes new developments and advances in the various areas of computational intelligence – quickly and with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life science, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems, and hybrid intelligent systems. Critical to both contributors and readers are the short publication time and world-wide distribution - this permits a rapid and broad dissemination of research results. The purpose of the 1st ACIS International Conference on Computers, Networks, Systems, and Industrial Engineering (CNSI 2011) was held on May23-25, 2011 in Jeju, Jeju Island, South Korea is to bring together scientist, engineers, computer users, students to share their experiences and exchange new ideas, and research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them The conference organizers selected the best 22 papers from those papers accepted for presentation at the conference in order to publish them in this volume. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
|
0 |
|a Computational intelligence.
|
650 |
1 |
4 |
|a Engineering.
|
650 |
2 |
4 |
|a Computational Intelligence.
|
650 |
2 |
4 |
|a Artificial Intelligence (incl. Robotics).
|
700 |
1 |
|
|a Lee, Roger.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783642213748
|
830 |
|
0 |
|a Studies in Computational Intelligence,
|x 1860-949X ;
|v 365
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-21375-5
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
950 |
|
|
|a Engineering (Springer-11647)
|