語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
查詢
薦購
讀者園地
我的帳戶
說明
簡單查詢
進階查詢
圖書館推薦圖書
讀者推薦圖書(公開)
教師指定參考書
借閱排行榜
預約排行榜
分類瀏覽
展示書
專題書單RSS
個人資料
個人檢索策略
個人薦購
借閱紀錄/續借/預約
個人評論
個人書籤
東區互惠借書
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Computer and information science
~
Lee, Roger.
FindBook
Google Book
Amazon
博客來
Computer and information science
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Computer and information science/ edited by Roger Lee.
其他作者:
Lee, Roger.
出版者:
Cham :Springer International Publishing : : 2015.,
面頁冊數:
xiii, 209 p. :ill., digital ;24 cm.
內容註:
A New Method of Breakpoint Connection for Human Skeleton Image -- Insult Detection in Social Network Comments using Possibilistic based Fusion Approach -- What Information in Software Historical Repositories Do We Need to Support Software Maintenance Tasks An Approach Based on Topic Model -- Evaluation Framework for the Dependability of Ubiquitous Learning Environment -- Improving Content Recommendation in Social Streams via Interest Model -- Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks -- Live Migration Performance Modelling for Virtual Machines with Resizable Memory -- A Heuristic Algorithm forWorkflow-Based Job Scheduling in Decentralized Distributed Systems with Heterogeneous Resources -- Novel Data Integrity Verification Schemes in Cloud Storage -- Generation of Assurance Cases For Medical Devices -- A Survey on the Categories of Service Value/Quality/Satisfactory Factors -- Effective Domain Modeling for Mobile Business AHMS (Adaptive Human Management Systems) Requirements.
Contained By:
Springer eBooks
標題:
Computer science -
電子資源:
http://dx.doi.org/10.1007/978-3-319-10509-3
ISBN:
9783319105093 (electronic bk.)
Computer and information science
Computer and information science
[electronic resource] /edited by Roger Lee. - Cham :Springer International Publishing :2015. - xiii, 209 p. :ill., digital ;24 cm. - Studies in computational intelligence,v.5661860-949X ;. - Studies in computational intelligence ;v.379..
A New Method of Breakpoint Connection for Human Skeleton Image -- Insult Detection in Social Network Comments using Possibilistic based Fusion Approach -- What Information in Software Historical Repositories Do We Need to Support Software Maintenance Tasks An Approach Based on Topic Model -- Evaluation Framework for the Dependability of Ubiquitous Learning Environment -- Improving Content Recommendation in Social Streams via Interest Model -- Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks -- Live Migration Performance Modelling for Virtual Machines with Resizable Memory -- A Heuristic Algorithm forWorkflow-Based Job Scheduling in Decentralized Distributed Systems with Heterogeneous Resources -- Novel Data Integrity Verification Schemes in Cloud Storage -- Generation of Assurance Cases For Medical Devices -- A Survey on the Categories of Service Value/Quality/Satisfactory Factors -- Effective Domain Modeling for Mobile Business AHMS (Adaptive Human Management Systems) Requirements.
This edited book presents scientific results of the 13th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2014) which was held on June 4-6, 2014 in Taiyuan, China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 14 of the conference most promising papers, and we impatiently await the important contributions that we know these authors will bring to the field of computer and information science.
ISBN: 9783319105093 (electronic bk.)
Standard No.: 10.1007/978-3-319-10509-3doiSubjects--Topical Terms:
893650
Computer science
LC Class. No.: QA75.5
Dewey Class. No.: 004
Computer and information science
LDR
:03196nmm a2200325 a 4500
001
1994247
003
DE-He213
005
20150603105434.0
006
m d
007
cr nn 008maaau
008
151019s2015 gw s 0 eng d
020
$a
9783319105093 (electronic bk.)
020
$a
9783319105086 (paper)
024
7
$a
10.1007/978-3-319-10509-3
$2
doi
035
$a
978-3-319-10509-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA75.5
072
7
$a
UYQ
$2
bicssc
072
7
$a
COM004000
$2
bisacsh
082
0 4
$a
004
$2
23
090
$a
QA75.5
$b
.I61 2014
245
1 0
$a
Computer and information science
$h
[electronic resource] /
$c
edited by Roger Lee.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2015.
300
$a
xiii, 209 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Studies in computational intelligence,
$x
1860-949X ;
$v
v.566
505
0
$a
A New Method of Breakpoint Connection for Human Skeleton Image -- Insult Detection in Social Network Comments using Possibilistic based Fusion Approach -- What Information in Software Historical Repositories Do We Need to Support Software Maintenance Tasks An Approach Based on Topic Model -- Evaluation Framework for the Dependability of Ubiquitous Learning Environment -- Improving Content Recommendation in Social Streams via Interest Model -- Performance Evaluation of Unsupervised Learning Techniques for Intrusion Detection in Mobile Ad Hoc Networks -- Live Migration Performance Modelling for Virtual Machines with Resizable Memory -- A Heuristic Algorithm forWorkflow-Based Job Scheduling in Decentralized Distributed Systems with Heterogeneous Resources -- Novel Data Integrity Verification Schemes in Cloud Storage -- Generation of Assurance Cases For Medical Devices -- A Survey on the Categories of Service Value/Quality/Satisfactory Factors -- Effective Domain Modeling for Mobile Business AHMS (Adaptive Human Management Systems) Requirements.
520
$a
This edited book presents scientific results of the 13th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2014) which was held on June 4-6, 2014 in Taiyuan, China. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them. The conference organizers selected the best papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. This publication captures 14 of the conference most promising papers, and we impatiently await the important contributions that we know these authors will bring to the field of computer and information science.
650
0
$a
Computer science
$3
893650
650
0
$a
Information science
$v
Congresses.
$3
1244255
650
1 4
$a
Engineering.
$3
586835
650
2 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Artificial Intelligence (incl. Robotics)
$3
890894
700
1
$a
Lee, Roger.
$3
898481
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Studies in computational intelligence ;
$v
v.379.
$3
1565969
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-10509-3
950
$a
Engineering (Springer-11647)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9266951
電子資源
11.線上閱覽_V
電子書
EB QA75.5
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入