Intelligent Information Processing VII: 8th IFIP TC 12 International Conference, IIP 2014, Hangzhou, China, October 17-20, 2014, Proceedings

Author:   Zhongzhi Shi ,  Zhaohui Wu ,  David Leake ,  Uli Sattler
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   Softcover reprint of the original 1st ed. 2014
Volume:   432
ISBN:  

9783662516089


Pages:   324
Publication Date:   11 September 2016
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Intelligent Information Processing VII: 8th IFIP TC 12 International Conference, IIP 2014, Hangzhou, China, October 17-20, 2014, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Zhongzhi Shi ,  Zhaohui Wu ,  David Leake ,  Uli Sattler
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   Softcover reprint of the original 1st ed. 2014
Volume:   432
Dimensions:   Width: 15.50cm , Height: 1.80cm , Length: 23.50cm
Weight:   0.528kg
ISBN:  

9783662516089


ISBN 10:   366251608
Pages:   324
Publication Date:   11 September 2016
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Semi-paired Probabilistic Canonical Correlation Analysis.- Using Bat Algorithm with Levy Walk to Solve Directing Orbits of Chaotic Systems.- Complex Proteomes Analysis Using Label-Free Mass Spectrometry-Based Quantitative Approach Coupled with Biomedical Knowledge.- Online Migration Solver Based on Instructions Statistics: Algorithm for Deciding Offload Function Set on Mobile Cloud System.- Improved Hierarchical K-means Clustering Algorithm without Iteration Based on Distance Measurement.- An Optimized Tag Recommender Algorithm in Folksonomy.- Extracting Part-Whole Relations from Online Encyclopedia.- Topic Detection and Evolution Analysis on Microblog.- A DBN-Based Classifying Approach to Discover the Internet Water Army.- An Efficient Microblog Hot Topic Detection Algorithm Based on Two Stage Clustering.- Collecting Valuable Information from Fast Text Streams.- An AUML State Machine Based Method for Multi-agent Systems Model Checking.- Adaptive Mechanism Based on Shared Learning in Multi-agent System.- An Agent-Based Autonomous Management Approach to Dynamic Services.- Research and Application Analysis of Feature Binding Mechanism.- The Correspondence between Propositional Modal Logic with Axiom _φ ↔ ♦φ and the Propositional Logic.- A Sound and Complete Axiomatic System for Modality _φ ≡ _1φ ∧ _2φ.- Verification of Branch-Time Property Based on Dynamic Description Logic.- Dynamic Description Logic Based on DL-Lite.- Formalizing the Matrix Inversion Based on the Adjugate Matrix in HOL4.- A Heuristic Approach to Acquisition of Minimum Decision Rule Sets in Decision Systems.- Cooperative Decision Algorithm for Time Critical Assignment without Explicit Communication.- Using PDDL to Solve Vehicle Routing Problems.- Automated Localization and Accurate Segmentation of Optic Disc Based on Intensity within a Minimum Enclosing Circle.- An Optimization Scheme for SVAC Audio Encoder.- A Traffic Camera Calibration Method Based on Multi-rectangle: Calibrating aCamera Using Multi-rectangle Constructed by Mark Lines in Traffic Road.- A Multi-instance Multi-label Learning Framework of Image Retrieval.- The Retrieval of Shoeprint Images Based on the Integral Histogram of the Gabor Transform Domain.- Scene Classification Using Spatial and Color Features.- Multipath Convolutional-Recursive Neural Networks for Object Recognition.- Identification of Co-regulated Gene Network by Using Path Consistency Algorithm Based on Gene Ontology.- Case Retrieval for Network Security Emergency Response Based on Description Logic.- On the Prevention of Invalid Route Injection Attack.- A Formal Model for Attack Mutation Using Dynamic Description Logics.- Efficient Integrity Protection for P2P Streaming.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List