Skip to content
Scan a barcode
Scan
Paperback Computer and Information Sciences II: 26th International Symposium on Computer and Information Sciences Book

ISBN: 1447158105

ISBN13: 9781447158103

Computer and Information Sciences II: 26th International Symposium on Computer and Information Sciences

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: New

$219.99
50 Available
Ships within 2-3 days

Book Overview

Search Computing: Addressing Complex Search on the Web.- Hypergraph-Theoretic Partitioning Models for Parallel Web Crawling.- Web Service Discovery: A Service Oriented, Peer-to-Peer Approach with Categorization.- Finding High Order Dependencies in Data.- Heuristic Algorithms for Real-Time Unsplittable Data Dissemination Problem.- Automatic Categorization of Ottoman Literary Texts by Poet and Time Period.- An Empirical Study About Search-Based Refactoring Using Alternative Multiple and Population-Based Search Techniques.- Unsupervised Morphological Analysis Using Tries.- A Novel Approach to Morphological Disambiguation for Turkish.- A Small Footprint Hybrid Statistical and Unit Selection Text-To-Speech Synthesis System for Turkish.- Enhancing Incremental Feature Subset Selection in High-Dimensional Databases by Adding a Backward Step.- Memory Resident Parallel Inverted Index Construction.- Dynamic Programming with Ant Colony Optimization Metaheuristic for Optimization of Distributed Database Queries.- Energy Cost Model for Frequent Item Set Discovery in Unstructured P2P Networks.- Towards a Fairer Energy Consumption in Wireless Ad Hoc Networks.- Energy Efficient Resource Allocation Strategy for Cloud Data Centers.- A Survey of Recent Work on Energy Harvesting Networks.- Distributed Energy-Aware Routing of Traffic.- A Distributed Scheme to Detect Wormhole Attacks in Mobile Wireless Sensor Networks.- Cross-Layer Optimization with Two-Group Loading for Ad-Hoc Networks.- Algorithms for Sink Mobility in Wireless Sensor Networks to Improve Network Lifetime.- A Hybrid Interference-Aware Multi-Path Routing Protocol for Mobile Ad Hoc Network.- Providing Automated Actions in Wireless Multimedia Sensor Networks via Active Rules.- File Transfer Application for Sharing Femto Access.- Time Parallel Simulation and hv-Monotonicity.- A Prediction Based Mobility Extension for eHIP Protocol.- Performance Evaluation of a Multiuser Interactive Networking System - A Comparison of Modeling Methods.- Auction-Based Admission Control for Self-Aware Networks.- Complexity Reduction for Multi-hop Network End-to-end Delay Minimization.- Performance Improvement of an Optical Network Providing.- G-Network Modelling Based Abnormal Pathway Detection in Gene Regulatory Networks.- DeDALO: A Framework for Distributed Systems Dependencies Discovery and Analysis.- A Content-Based Social Network Study of Evliya Celebi's Seyahatname-Bitlis Section.- On the Parameterised Complexity of Learning Patterns.- Using SVM to Avoid Humans - A Case of a Small Autonomous Mobile Robot in an Office.- Palmprint Verification Using Sift Majority Voting.- 3D Object Exploration using Viewpoint and Mesh Saliency Entropies.- Boundary Descriptors for Visual Speech Recognition.- Semi-Automatic Adaptation of High-Polygon Wireframe Face Models Through Inverse Perspective Projection.- A Fuzzy Metric in GPUs: Fast and Efficient Method for the Impulsive Image Noise Removal.- Improved Secret Image Sharing Method by Encoding Shared Values with Authentication Bits.- Intelligent Navigation Systems for Building Evacuation.- Automatic Population of Scenarios with Augmented Virtuality.- Support for Resilient Communications in Future Disaster Management.- Agent-Based Modeling of a Price Information Trading Business.- Modeling Lane Preferences in Agent-Based Multi-Lane Highway Simulation.- Chromosome Coding Methods in Genetic Algorithm for Path Planning of Mobile Robots.- Client-Based CardSpace-OpenID Interoperation.- An Artificial Immune Classifier Using Pseudo-Ellipsoid Rules.- Contextually Learnt Detection of Unusual Motion-Based Behaviour in Crowded Public Spaces.- Grid Security Loopholes with Proposed Countermeasures.- Detection of Broken Link Fraud in DSDV Routing.- Strategies for Risk Facing in Work Environments.- Numerical Integration Methods for Simulation of Mass-Spring-Damper Systems.- Multi-layered Simulation Architecture: A Practical Approach.- Variable Threshold Based Cutting Method for Vi

Customer Reviews

0 rating
Copyright © 2026 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured