|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Erol Gelenbe , Ricardo Lent , Georgia SakellariPublisher: Springer London Ltd Imprint: Springer London Ltd Edition: 2012 ed. Dimensions: Width: 15.50cm , Height: 3.00cm , Length: 23.50cm Weight: 0.908kg ISBN: 9781447158103ISBN 10: 1447158105 Pages: 586 Publication Date: 28 November 2013 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsSearch Computing: Addressing Complex Search on the Web.- Hypergraph-Theoretic Partitioning Models for Parallel Web Crawling.- Web Service Discovery: A Service Oriented, Peer-to-Peer Approach with Categorization.- Finding High Order Dependencies in Data.- Heuristic Algorithms for Real-Time Unsplittable Data Dissemination Problem.- Automatic Categorization of Ottoman Literary Texts by Poet and Time Period.- An Empirical Study About Search-Based Refactoring Using Alternative Multiple and Population-Based Search Techniques.- Unsupervised Morphological Analysis Using Tries.- A Novel Approach to Morphological Disambiguation for Turkish.- A Small Footprint Hybrid Statistical and Unit Selection Text-To-Speech Synthesis System for Turkish.- Enhancing Incremental Feature Subset Selection in High-Dimensional Databases by Adding a Backward Step.- Memory Resident Parallel Inverted Index Construction.- Dynamic Programming with Ant Colony Optimization Metaheuristic for Optimization of Distributed Database Queries.- Energy Cost Model for Frequent Item Set Discovery in Unstructured P2P Networks.- Towards a Fairer Energy Consumption in Wireless Ad Hoc Networks.- Energy Efficient Resource Allocation Strategy for Cloud Data Centers.- A Survey of Recent Work on Energy Harvesting Networks.- Distributed Energy-Aware Routing of Traffic.- A Distributed Scheme to Detect Wormhole Attacks in Mobile Wireless Sensor Networks.- Cross-Layer Optimization with Two-Group Loading for Ad-Hoc Networks.- Algorithms for Sink Mobility in Wireless Sensor Networks to Improve Network Lifetime.- A Hybrid Interference-Aware Multi-Path Routing Protocol for Mobile Ad Hoc Network.- Providing Automated Actions in Wireless Multimedia Sensor Networks via Active Rules.- File Transfer Application for Sharing Femto Access.- Time Parallel Simulation and hv-Monotonicity.- A Prediction Based Mobility Extension for eHIP Protocol.- Performance Evaluation of a Multiuser Interactive Networking System - A Comparison of ModelingMethods.- Auction-Based Admission Control for Self-Aware Networks.- Complexity Reduction for Multi-hop Network End-to-end Delay Minimization.- Performance Improvement of an Optical Network Providing.- G-Network Modelling Based Abnormal Pathway Detection in Gene Regulatory Networks.- DeDALO: A Framework for Distributed Systems Dependencies Discovery and Analysis.- A Content-Based Social Network Study of Evliya Celebi’s Seyahatname-Bitlis Section.- On the Parameterised Complexity of Learning Patterns.- Using SVM to Avoid Humans - A Case of a Small Autonomous Mobile Robot in an Office.- Palmprint Verification Using Sift Majority Voting.- 3D Object Exploration using Viewpoint and Mesh Saliency Entropies.- Boundary Descriptors for Visual Speech Recognition.- Semi-Automatic Adaptation of High-Polygon Wireframe Face Models Through Inverse Perspective Projection.- A Fuzzy Metric in GPUs: Fast and Efficient Method for the Impulsive Image Noise Removal.- Improved Secret Image Sharing Method by Encoding Shared Values with Authentication Bits.- Intelligent Navigation Systems for Building Evacuation.- Automatic Population of Scenarios with Augmented Virtuality.- Support for Resilient Communications in Future Disaster Management.- Agent-Based Modeling of a Price Information Trading Business.- Modeling Lane Preferences in Agent-Based Multi-Lane Highway Simulation.- Chromosome Coding Methods in Genetic Algorithm for Path Planning of Mobile Robots.- Client-Based CardSpace-OpenID Interoperation.- An Artificial Immune Classifier Using Pseudo-Ellipsoid Rules.- Contextually Learnt Detection of Unusual Motion-Based Behaviour in Crowded Public Spaces.- Grid Security Loopholes with Proposed Countermeasures.- Detection of Broken Link Fraud in DSDV Routing.- Strategies for Risk Facing in Work Environments.- Numerical Integration Methods for Simulation of Mass-Spring-Damper Systems.- Multi-layered Simulation Architecture: A Practical Approach.- Variable Threshold Based Cutting Method forVirtual Surgery Simulations.- Model Based Approach to the Federation Object Model (FOM) Independence Problem.- Secondary Bus Performance in Retiring Cache Writebacks to Memory.- Runtime Verification of Component-Based Embedded Software.- Model-Based Software Integration for Flexible Design of Cyber-Physical Systems.- Generating Preset Distinguishing Sequences Using SAT.- A Decision-Making Ontology for Analytical Requirements Elicitation.- Spatio-temporal Pattern and Trend Extraction on Turkish Meteorological Data.- Contrastive Learning in Random Neural Networks and Its Relation to Gradient-Descent Learning.- A Genetic Algorithms Based Classifier for Object Classification in Images.- Two Alternate Methods for Information Retrieval from Turkish Radiology Reports.- Scaled On-line Unsupervised Learning Algorithm for a SOM-HMM Hybrid.- Sequential Pattern Knowledge in Multi-Relational Learning.- Zoom-In/Zoom-Out Algorithms for FCA with Attribute Granularity.- A Hyper-heuristic Based on Random Gradient, Greedy and Dominance.- A Class of Methods Combining L-BFGS and Truncated Newton.- Adaptation and Fine-Tuning of the Weighted Sum Method on Personnel Assignment Problem with Hierarchical Ordering and Team Constraints.- An Option Pricing Model Calibration Using Algorithmic Differentiation.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |