Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing
Herausgegeben:Lee, Roger
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing
Herausgegeben:Lee, Roger
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The 9th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, held in Phuket Thailand on August 6 - 8, 2008 is aimed at bringing together researchers and scientist, businessmen and entrepreneurs, teachers and students to discuss the numerous fields of computer science, and to share ideas and information in a meaningful way. This publication captures 20 of the conference's most promising papers, and we impatiently await the important contributions that we know these authors will bring to the field.
Andere Kunden interessierten sich auch für
- Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing112,99 €
- Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing112,99 €
- Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing 2012115,99 €
- Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing160,49 €
- Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing112,99 €
- Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing75,99 €
- Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing119,99 €
-
-
-
The 9th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, held in Phuket Thailand on August 6 - 8, 2008 is aimed at bringing together researchers and scientist, businessmen and entrepreneurs, teachers and students to discuss the numerous fields of computer science, and to share ideas and information in a meaningful way. This publication captures 20 of the conference's most promising papers, and we impatiently await the important contributions that we know these authors will bring to the field.
Produktdetails
- Produktdetails
- Studies in Computational Intelligence 149
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-642-08949-7
- Softcover reprint of hardcover 1st edition 2008
- Seitenzahl: 276
- Erscheinungstermin: 28. Oktober 2010
- Englisch
- Abmessung: 235mm x 155mm x 16mm
- Gewicht: 423g
- ISBN-13: 9783642089497
- ISBN-10: 3642089496
- Artikelnr.: 32058488
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
- Studies in Computational Intelligence 149
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 978-3-642-08949-7
- Softcover reprint of hardcover 1st edition 2008
- Seitenzahl: 276
- Erscheinungstermin: 28. Oktober 2010
- Englisch
- Abmessung: 235mm x 155mm x 16mm
- Gewicht: 423g
- ISBN-13: 9783642089497
- ISBN-10: 3642089496
- Artikelnr.: 32058488
- Herstellerkennzeichnung
- Springer-Verlag GmbH
- Tiergartenstr. 17
- 69121 Heidelberg
- ProductSafety@springernature.com
Stopping Criterion Selection for Efficient Semi-supervised Time Series Classification.- Enhancing the Blockage of Spam over Internet Telephony (SPIT) Using Adaptive PMG Algorithm.- Spatio-temporal Facial Expression Recognition Using Optical Flow and HMM.- An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction.- Challenges Relating to RFID Implementation within the Electronic Supply Chain Management - A Practical Approach.- Design and Implementation of Clustering File Backup Server Using File Fingerprint.- Aspect Oriented Testing Frameworks for Embedded Software.- Analysis on Malicious Peer's Behavior of the P2P Trust Resource Chain Model.- Information Technology Service Management: A Thailand Perspective.- A New Artificial Immune System for the Detection of Abnormal Behaviour.- Markov Chain Analysis of Genetic Algorithms Applied to Fitness Functions Perturbed by Multiple Sources of Additive Noise.- A Security Supervision System for Hybrid Networks.- Cost Minimization in Service Systems Using Particle Swarm Optimization.- MS2Web: Applying MDA and SOA to Web Services.- Security Analysis of One Verifiable Encryption Scheme.- Proactive Fault Management with Virtualization for Software Aging.- A Preemption Control Technique for System Energy Minimization of Weakly Hard Real-Time Systems.- Text Classification by Relearning and Ensemble Computation.- Analysis of Agents' Cooperation in RoboCupRescue Simulation.- A Data Mining Approach for Predicting Reliable Path for Congestion Free Routing Using Self-motivated Neural Network.- A Formal Specification of UML Class and State Diagrams.
Stopping Criterion Selection for Efficient Semi-supervised Time Series Classification.- Enhancing the Blockage of Spam over Internet Telephony (SPIT) Using Adaptive PMG Algorithm.- Spatio-temporal Facial Expression Recognition Using Optical Flow and HMM.- An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and Direction.- Challenges Relating to RFID Implementation within the Electronic Supply Chain Management - A Practical Approach.- Design and Implementation of Clustering File Backup Server Using File Fingerprint.- Aspect Oriented Testing Frameworks for Embedded Software.- Analysis on Malicious Peer's Behavior of the P2P Trust Resource Chain Model.- Information Technology Service Management: A Thailand Perspective.- A New Artificial Immune System for the Detection of Abnormal Behaviour.- Markov Chain Analysis of Genetic Algorithms Applied to Fitness Functions Perturbed by Multiple Sources of Additive Noise.- A Security Supervision System for Hybrid Networks.- Cost Minimization in Service Systems Using Particle Swarm Optimization.- MS2Web: Applying MDA and SOA to Web Services.- Security Analysis of One Verifiable Encryption Scheme.- Proactive Fault Management with Virtualization for Software Aging.- A Preemption Control Technique for System Energy Minimization of Weakly Hard Real-Time Systems.- Text Classification by Relearning and Ensemble Computation.- Analysis of Agents' Cooperation in RoboCupRescue Simulation.- A Data Mining Approach for Predicting Reliable Path for Congestion Free Routing Using Self-motivated Neural Network.- A Formal Specification of UML Class and State Diagrams.