Inicio > > Redes y comunicaciones informáticas > Computer and Information Sciences II
Computer and Information Sciences II

Computer and Information Sciences II

 

463,09 €
IVA incluido
Consulta disponibilidad
Editorial:
Springer Nature B.V.
Año de edición:
2011
Materia
Redes y comunicaciones informáticas
ISBN:
9781447121541

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Search Computing: Addressing Complex Search on the Web.- Hypergraph-Theoretic Partitioning Models for Parallel Web Crawling.- Web Service Discovery: A Service Oriented, Peer-to-Peer Approach with Categorization.- Finding High Order Dependencies in Data.- Heuristic Algorithms for Real-Time Unsplittable Data Dissemination Problem.- Automatic Categorization of Ottoman Literary Texts by Poet and Time Period.- An Empirical Study About Search-Based Refactoring Using Alternative Multiple and Population-Based Search Techniques.- Unsupervised Morphological Analysis Using Tries.- A Novel Approach to Morphological Disambiguation for Turkish.- A Small Footprint Hybrid Statistical and Unit Selection Text-To-Speech Synthesis System for Turkish.- Enhancing Incremental Feature Subset Selection in High-Dimensional Databases by Adding a Backward Step.- Memory Resident Parallel Inverted Index Construction.- Dynamic Programming with Ant Colony Optimization Metaheuristic for Optimization of Distributed Database Queries.- Energy Cost Model for Frequent Item Set Discovery in Unstructured P2P Networks.- Towards a Fairer Energy Consumption in Wireless Ad Hoc Networks.- Energy Efficient Resource Allocation Strategy for Cloud Data Centers.- A Survey of Recent Work on Energy Harvesting Networks.- Distributed Energy-Aware Routing of Traffic.- A Distributed Scheme to Detect Wormhole Attacks in Mobile Wireless Sensor Networks.- Cross-Layer Optimization with Two-Group Loading for Ad-Hoc Networks.- Algorithms for Sink Mobility in Wireless Sensor Networks to Improve Network Lifetime.- A Hybrid Interference-Aware Multi-Path Routing Protocol for Mobile Ad Hoc Network.- Providing Automated Actions in Wireless Multimedia Sensor Networks via Active Rules.- File Transfer Application for Sharing Femto Access.- Time Parallel Simulation and hv-Monotonicity.- A Prediction Based Mobility Extension for eHIP Protocol.- Performance Evaluation of a Multiuser Interactive Networking System - A Comparison of Modeling Methods.- Auction-Based Admission Control for Self-Aware Networks.- Complexity Reduction for Multi-hop Network End-to-end Delay Minimization.- Performance Improvement of an Optical Network Providing.- G-Network Modelling Based Abnormal Pathway Detection in Gene Regulatory Networks.- DeDALO: A Framework for Distributed Systems Dependencies Discovery and Analysis.- A Content-Based Social Network Study of Evliya Celebi’s Seyahatname-Bitlis Section.- On the Parameterised Complexity of Learning Patterns.- Using SVM to Avoid Humans - A Case of a Small Autonomous Mobile Robot in an Office.- Palmprint Verification Using Sift Majority Voting.- 3D Object Exploration using Viewpoint and Mesh Saliency Entropies.- Boundary Descriptors for Visual Speech Recognition.- Semi-Automatic Adaptation of High-Polygon Wireframe Face Models Through Inverse Perspective Projection.- A Fuzzy Metric in GPUs: Fast and Efficient Method for the Impulsive Image Noise Removal.- Improved Secret Image Sharing Method by Encoding Shared Values with Authentication Bits.- Intelligent Navigation Systems for Building Evacuation.- Automatic Population of Scenarios with Augmented Virtuality.- Support for Resilient Communications in Future Disaster Management.- Agent-Based Modeling of a Price Information Trading Business.- Modeling Lane Preferences in Agent-Based Multi-Lane Highway Simulation.- Chromosome Coding Methods in Genetic Algorithm for Path Planning of Mobile Robots.- Client-Based CardSpace-OpenID Interoperation.- An Artificial Immune Classifier Using Pseudo-Ellipsoid Rules.- Contextually Learnt Detection of Unusual Motion-Based Behaviour in Crowded Public Spaces.- Grid Security Loopholes with Proposed Countermeasures.- Detection of Broken Link Fraud in DSDV Routing.- Strategies for Risk Facing in Work Environments.- Numerical Integration Methods for Simulation of Mass-Spring-Damper Systems.- Multi-layered Simulation Architecture: A Practical Approach.- Variable Threshold Based Cutting Method for Vi

Artículos relacionados

  • Next Generation Search Engines
    Recent technological progress in computer science, Web technologies, and the constantly evolving information available on the Internet has drastically changed the landscape of search and access to information. Current search engines employ advanced techniques involving machine learning, social networks, and semantic analysis. Next Generation Search Engines: Advanced Models for ...
  • Collaboration and the Semantic Web
    Collaborative working has been increasingly viewed as a good practice for organizations to achieve efficiency. Organizations that work well in collaboration may have access to new sources of funding, deliver new, improved, and more integrated services, make savings on shared costs, and exchange knowledge, information and expertise. Collaboration and the Semantic Web: Social Net...
  • Resource Allocation in Next-Generation Broadband Wireless Access Networks
    With the growing popularity of wireless networks in recent years, the need to increase network capacity and efficiency has become more prominent in society. This has led to the development and implementation of heterogeneous networks. Resource Allocation in Next-Generation Broadband Wireless Access Networks is a comprehensive reference source for the latest scholarly research o...
  • Advanced Topics in Information Technology Standards and Standardization Research, Volume 1
    Kai Jakobs
    ...
  • Data Warehouses and OLAP
    ...
  • Selected Readings on Database Technologies and Applications
    Terry Halpin
    Education and research in the field of database technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Database Technologies and Applications supplements course instruction and student research with quality chapters focused on key issues concerning the development, design, and analysis ...