Information Sciences And Systems 2013: Proceedings Of The 28th International Symposium On Computer And Information Sciences by Erol GelenbeInformation Sciences And Systems 2013: Proceedings Of The 28th International Symposium On Computer And Information Sciences by Erol Gelenbe

Information Sciences And Systems 2013: Proceedings Of The 28th International Symposium On Computer…

byErol GelenbeEditorRicardo Lent

Paperback | August 23, 2016

Pricing and Purchase Info

$312.22 online 
$343.95 list price save 9%
Earn 1,561 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

Based on a rigorous selection from 58 proposals coming from across the world, this volume will include some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. The book will offer the reader with a timely access to innovative research from many different areas of the world where advances in computing and communications are created.
Erol Gelenbe is internationally recognised for his pioneering work in the field of computer and network performance evaluation. As a Professor at Imperial College he explores the interface between information technology and the physical and economical systems that ICT observes, operates and manages. His current research addresses the s...
Loading
Title:Information Sciences And Systems 2013: Proceedings Of The 28th International Symposium On Computer…Format:PaperbackDimensions:440 pages, 23.5 × 15.5 × 1.73 inPublished:August 23, 2016Publisher:Springer NatureLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3319377647

ISBN - 13:9783319377643

Look for similar items by category:

Reviews

Table of Contents

Section 1: Smart Algorithms.- Adaptive Curve Tailoring.- Regularizing Soft Decision Trees.- A Simple Yet Fast Algorithm for the Closest-Pair Problem Using Sorted Projections on Multi-dimensions.- DARWIN - A Genetic Algorithm Language.- Distributed Selfish Algorithms for the Max-Cut game.- Section 2: Analysis, Modelling and Optimisation.- Distributed Binary Consensus in Dynamic Networks.- Computing bounds of the MTTF for a set of Markov Chains.- Analysing and Predicting Patient Arrival Times in Hospitals using Hidden Markov Models.- Optimal Behaviour of Smart Wireless Users.- Hyper-heuristics for Performance Optimization of Simultaneous Multithreaded Processors.- A Model of Speculative Parallel Scheduling in Networks of Unreliable Sensors.- Energy-Aware Admission Control for Wired Networks.- Section 3: Computational Linguistics.- Named Entity Recognition in Turkish with Bayesian Learning and Hybrid Approaches.- Transfer Learning Using Twitter Data for Improving Sentiment Classification of Turkish Political News.- A Fully Semantic Approach to Large Scale Text Categorization.- Emotion Analysis on Turkish Texts.- A Comparative Study to Determine the Effective Window Size of Turkish Word Sense Disambiguation Systems.- Section 4: Computer Vision.- Eyes Detection Combined Feature Extraction and Mouth Information.- Depth From Moving Apertures.- Score Level Fusion for Face-Iris Multimodal Biometric System.- Feature Selection for Enhanced 3D Facial Expression Recognition Based On Varying Feature Point Distances.- Section 5: Data and Web Engineering.- DAPNA: An Architectural Framework for Data Processing Networks.- Crescent: A Byzantine Fault Tolerant Delivery Framework for Durable Composite Web Services.- Morphological Document Recovery in HSI space.- Ontological Approach to Data Warehouse Source Integration.- Adaptive Oversampling with Active Learning in Imbalanced Data Classication.- Section 6: Wireless Sensor Networks.- Energy-Aware Distributed Hash Table-based Bootstrapping Protocol for Randomly Deployed Heterogeneous Wireless Sensor Networks.- Sensor-Activity Relevance in Human Activity Recognition with Wearable Motion Sensors and Mutual Information Criterion.- Routing Emergency Evacuees with Cognitive Packet Networks.- Detection and Evaluation of Physical Therapy Exercises by Dynamic Time Warping Using Wearable Motion Sensor Units.- Section 7: Network Security, Data Integrity and Privacy.- Commutative Matrix-Based Diffie-Hellman-Like Key-Exchange Protocol.- Anonymity in Multi-Instance Micro-Data Publication.- Homomorphic Minimum Bandwidth Repairing Codes.- Recreating a Large-scale BGP Incident in a Realistic Environment.- Uneven Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor Networks.- NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem.- Towards Visualizing mobile network data.- Infrastructure for Detecting Android Malware.- NEMESYS: First Year Project Experience in Telecom Italia Information Technology.- Android Security, Pitfalls, Lessons Learned and BYOD.- Mobile Network Threat Analysis & MNO Positioning.- Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach.