Intelligent Information Processing VII: 8th IFIP TC 12 International Conference, IIP 2014, Hangzhou, China, October 17-20, 2014, Proceedings by Zhongzhi ShiIntelligent Information Processing VII: 8th IFIP TC 12 International Conference, IIP 2014, Hangzhou, China, October 17-20, 2014, Proceedings by Zhongzhi Shi

Intelligent Information Processing VII: 8th IFIP TC 12 International Conference, IIP 2014, Hangzhou…

byZhongzhi ShiEditorZhaohui Wu, David Leake

Hardcover | October 29, 2014

Pricing and Purchase Info

$151.95

Earn 760 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the refereed proceedings of the 8th IFIP TC 12 International Conference on Intelligent Information Processing, IIP 2014, held in Hangzhou, China, in October 2014. The 32 revised papers presented were carefully reviewed and selected from more than 70 submissions. They are organized in topical sections on machine learning, data mining, web mining, multi-agent systems, automatic reasoning, decision algorithms, multimedia, pattern recognition, and information security.
Title:Intelligent Information Processing VII: 8th IFIP TC 12 International Conference, IIP 2014, Hangzhou…Format:HardcoverDimensions:324 pagesPublished:October 29, 2014Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:366244979X

ISBN - 13:9783662449790

Look for similar items by category:

Reviews

Table of Contents

Semi-paired Probabilistic Canonical Correlation Analysis.- Using Bat Algorithm with Levy Walk to Solve Directing Orbits of Chaotic Systems.- Complex Proteomes Analysis Using Label-Free Mass Spectrometry-Based Quantitative Approach Coupled with Biomedical Knowledge.- Online Migration Solver Based on Instructions Statistics: Algorithm for Deciding Offload Function Set on Mobile Cloud System.- Improved Hierarchical K-means Clustering Algorithm without Iteration Based on Distance Measurement.- An Optimized Tag Recommender Algorithm in Folksonomy.- Extracting Part-Whole Relations from Online Encyclopedia.- Topic Detection and Evolution Analysis on Microblog.- A DBN-Based Classifying Approach to Discover the Internet Water Army.- An Efficient Microblog Hot Topic Detection Algorithm Based on Two Stage Clustering.- Collecting Valuable Information from Fast Text Streams.- An AUML State Machine Based Method for Multi-agent Systems Model Checking.- Adaptive Mechanism Based on Shared Learning in Multi-agent System.- An Agent-Based Autonomous Management Approach to Dynamic Services.- Research and Application Analysis of Feature Binding Mechanism.- The Correspondence between Propositional Modal Logic with Axiom _Ï ' '¦Ï and the Propositional Logic.- A Sound and Complete Axiomatic System for Modality _Ï '¡ _1Ï '§ _2Ï.- Verification of Branch-Time Property Based on Dynamic Description Logic.- Dynamic Description Logic Based on DL-Lite.- Formalizing the Matrix Inversion Based on the Adjugate Matrix in HOL4.- A Heuristic Approach to Acquisition of Minimum Decision Rule Sets in Decision Systems.- Cooperative Decision Algorithm for Time Critical Assignment without Explicit Communication.- Using PDDL to Solve Vehicle Routing Problems.- Automated Localization and Accurate Segmentation of Optic Disc Based on Intensity within a Minimum Enclosing Circle.- An Optimization Scheme for SVAC Audio Encoder.- A Traffic Camera Calibration Method Based on Multi-rectangle: Calibrating a Camera Using Multi-rectangle Constructed by Mark Lines in Traffic Road.- A Multi-instance Multi-label Learning Framework of Image Retrieval.- The Retrieval of Shoeprint Images Based on the Integral Histogram of the Gabor Transform Domain.- Scene Classification Using Spatial and Color Features.- Multipath Convolutional-Recursive Neural Networks for Object Recognition.- Identification of Co-regulated Gene Network by Using Path Consistency Algorithm Based on Gene Ontology.- Case Retrieval for Network Security Emergency Response Based on Description Logic.- On the Prevention of Invalid Route Injection Attack.- A Formal Model for Attack Mutation Using Dynamic Description Logics.- Efficient Integrity Protection for P2P Streaming.