eBook Information Sciences and Systems 2013, 1st Edition

  • Published By:
  • ISBN-10: 3319016040
  • ISBN-13: 9783319016047
  • DDC: 004
  • Grade Level Range: College Freshman - College Senior
  • 440 Pages | eBook
  • Original Copyright 2013 | Published/Released June 2014
  • This publication's content originally published in print form: 2013
  • Price:  Sign in for price

About

Overview

Based on a rigorous selection from 58 proposals coming from across the world, this volume will include some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. The book will offer the reader with a timely access to innovative research from many different areas of the world where advances in computing and communications are created.

Table of Contents

Front Cover.
Half Title Page.
Title Page.
Copyright Page.
Preface.
Acknowledgment to Programme Committee Members and Referees.
Contents.
1: Smart Algorithms.
2: Adaptive Curve Tailoring.
3: Regularizing Soft Decision Trees.
4: A Simple Yet Fast Algorithm for the Closest-Pair Problem Using Sorted Projections on Multi-Dimensions.
5: DARWIN: A Genetic Algorithm Language.
6: Distributed Selfish Algorithms for the Max-Cut Game.
7: Analysis, Modelling and Optimisation.
8: Distributed Binary Consensus in Dynamic Networks.
9: Computing Bounds of the MTTF for a Set of Markov Chains.
10: Analysing and Predicting Patient Arrival Times.
11: Optimal Behaviour of Smart Wireless Users.
12: Hyper-Heuristics for Performance Optimization of Simultaneous Multithreaded Processors.
13: A Model of Speculative Parallel Scheduling in Networks of Unreliable Sensors.
14: Energy-Aware Admission Control for Wired Networks.
15: Computational Linguistics.
16: Named Entity Recognition in Turkish with Bayesian Learning and Hybrid Approaches.
17: Transfer Learning Using Twitter Data for Improving Sentiment Classification of Turkish Political News.
18: A Fully Semantic Approach to Large Scale Text Categorization.
19: Emotion Analysis on Turkish Texts.
20: A Comparative Study to Determine the Effective Window Size of Turkish Word Sense Disambiguation Systems.
21: Computer Vision.
22: Eyes Detection Combined Feature Extraction and Mouth Information.
23: Depth from Moving Apertures.
24: Score Level Fusion for Face-Iris Multimodal Biometric System.
25: Feature Selection for Enhanced 3D Facial Expression Recognition Based on Varying Feature Point Distances.
26: Data and Web Engineering.
27: DAPNA: An Architectural Framework for Data Processing Networks.
28: Crescent: A Byzantine Fault Tolerant Delivery Framework for Durable Composite Web Services.
29: Morphological Document Recovery in HSI Space.
30: Ontological Approach to Data Warehouse Source Integration.
31: Adaptive Oversampling for Imbalanced Data Classification.
32: Wireless Sensor Networks.
33: Energy-Aware Distributed Hash Table-Based Bootstrapping Protocol for Randomly Deployed Heterogeneous Wireless Sensor Networks.
34: Sensor-Activity Relevance in Human Activity Recognition with Wearable Motion Sensors and Mutual Information Criterion.
35: Routing Emergency Evacuees with Cognitive Packet Networks.
36: Detection and Evaluation of Physical Therapy Exercises by Dynamic Time Warping Using Wearable Motion Sensor Units.
37: Network Security, Data Integrity and Privacy.
38: Commutative Matrix-Based Diffie-Hellman-Like Key-Exchange Protocol.
39: Anonymity in Multi-Instance Micro-Data Publication.
40: Homomorphic Minimum Bandwidth Repairing Codes.
41: Recreating a Large-Scale BGP Incident in a Realistic Environment.
42: Uneven Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor Networks.
43: NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem.
44: Towards Visualizing Mobile Network Data.
45: Infrastructure for Detecting Android Malware.
46: NEMESYS: First Year Project Experience in Telecom Italia Information Technology.
47: Android Security, Pitfalls and Lessons Learned.
48: Mobile Network Threat Analysis and MNO Positioning.
49: Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach.
Author Index.