FEEDBACK Smiley face
Normal view MARC view ISBD view

Computer Information Systems and Industrial Management [electronic resource] :13th IFIP TC8 International Conference, CISIM 2014, Ho Chi Minh City, Vietnam, November 5-7, 2014. Proceedings /

Contributor(s): Saeed, Khalid [editor.] | Snášel, Václav [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 8838Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014.Description: XVIII, 702 p. 313 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783662452370.Subject(s): Computer science | Computer communication systems | Software engineering | Algorithms | Information storage and retrieval | Pattern recognition | Computer Science | Computer Communication Networks | Information Systems Applications (incl. Internet) | Pattern Recognition | Software Engineering | Algorithm Analysis and Problem Complexity | Information Storage and RetrievalOnline resources: Click here to access online
Contents:
Processing Collective Knowledge – Conflict Resolution and Integration Aspects -- How to Store and Process Big Data: Are Today’s Databases Sufficient -- A New Contention Management Technique for Obstruction Free Transactional Memory -- Evolutionary Algorithm for Decision Tree Induction -- A New Method for Mining High Average Utility Itemsets -- Spectral Clustering Based on Analysis of Eigenvector Properties -- Applying Recurrent Fuzzy Neural Network to Predict the Runoff of Srepok River -- Comparison of Chaos Driven PSO and Differential Evolution on the Selected PID Tuning Problem -- Improving Rule Selection from Robot Soccer Strategy with Sub strategies -- Novel Ranking Methods Applied to Complex Membership Determination Problems -- Combination of Self Organizing Maps and Growing Neural Gas -- A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud -- On the Comparison of the Keystroke Dynamics Databases -- Influence of Eye Diseases on the Retina Pattern Recognition -- Pupil and Iris Detection Algorithm for Near-Infrared Capture Devices -- Query Selectivity Estimation Based on Improved V-optimal Histogram by Introducing Information about Distribution of Boundaries of Range Query Conditions -- Dynamic Centrality for Directed Co-author Network with Context -- Towards a Conceptual Search for Vietnamese Legal Text -- A Vietnamese Question Answering System in Vietnam’s Legal Documents -- An Inner-Enterprise Wiki System (IWkS) Integrated with an Expert Finding Mechanism for Lesson-Learned Knowledge Accumulation in Product Design -- Movie Recommendation Using OLAP and Multidimensional Data Model -- Decision Trees and Their Families in Imbalanced Pattern Recognition: Recognition with and without Rejection -- An Approach for Integrating Multidimensional Database into Context-Aware Recommender System -- Vietnamese Sentence Similarity Based on Concepts -- Materialized View Construction Based on Clustering Technique -- Big Data Spectra Analysis Using Analytical Programming and Random Decision Forests -- Man-Machine Interaction Improvement by Means of Automatic Human Personality Identification -- via RODOS: Monitoring and Visualisation of Current Traffic Situation on Highways -- Computation of Swing-up Signal for Inverted Pendulum Using Dynamic Optimization -- System and Application Scenarios for Disaster Management Processes, the Rainfall-Runoff Model Case Study -- An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse -- Abbreviation Method for Some Jointed Relations in Displaying Genealogy -- Proposing a Novel Architecture of Script Component to Incorporate the Scripting Language Support in SCADA Systems -- Agent-Based Context Management for Service-Oriented Environments -- Event Based Approaches for Solving Multi-mode Resource Constraints Project Scheduling Problem -- Non-cooperative Games Involving Type-2 Fuzzy Uncertainty: An Approach -- Joining Concept’s Based Fuzzy Cognitive Map Model with Moving Window Technique for Time Series Modeling -- Time Series Modeling with Fuzzy Cognitive Maps: Simplification Strategies-The Case of a Posteriori Removal of Nodes and Weights -- An Effective Initialization for ASM-Based Methods -- A Multiple Refinement Approach in Abstraction Model Checking -- Chaos Driven Particle Swarm Optimization with Basic Particle Performance Evaluation – An Initial Study -- Chaos Powered Grammatical Evolution -- Network Anomaly Detection Using Parameterized Entropy -- Universal Central Control of Home Appliances as an Expanding Element of the Smart Home Concepts -- An Off-the-Shelf Platform for Automatic and Interactive Text Messaging Using Short Message Service -- Application of PIL Approach for Automated Transportation Center -- A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring -- Analysis of Social Influence and Information Dissemination in Social Media: The Case of Twitter -- Multi–criteria Route Planning in Bus Network -- Pattern Recognition and Image Processing Enhanced LBP-Based Face Recognition System Using a Heuristic Approach for Searching Weight Set -- A Local Gaussian Filter and Adaptive Morphology as Tools for Completing Partially Discontinuous Curves -- Subspaces Clustering Approach to Lossy Image Compression -- An Impact of the User and Time Parameters to Sequence Alignment Methods for Process Mining -- An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature -- Grasping Action for Impaired Vision Action Using HC2D Barcode Technology -- Hardware Approach for Generating b-detectors by Immune-Based Algorithms -- Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges -- Protection Profile for Secure Sensitive Information System on Mobile Devices -- Implicit and Explicit Certificates-Based Encryption Scheme -- Malware Behavior Modeling with Colored Petri Nets -- A Proposal of Algorithm for Web Applications Cyber Attack Detection -- Semantic Set Analysis for Malware Detection.
In: Springer eBooksSummary: This book constitutes the proceedings of the 13th IFIP TC 8 International Conference on Computer Information Systems and Industrial Management, CISIM 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 60 paper presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: algorithms; biometrics and biometrics applications; data analysis and information retrieval; industrial management and other applications; modelling and optimization; networking; pattern recognition and image processing; and various aspects of computer security.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

Processing Collective Knowledge – Conflict Resolution and Integration Aspects -- How to Store and Process Big Data: Are Today’s Databases Sufficient -- A New Contention Management Technique for Obstruction Free Transactional Memory -- Evolutionary Algorithm for Decision Tree Induction -- A New Method for Mining High Average Utility Itemsets -- Spectral Clustering Based on Analysis of Eigenvector Properties -- Applying Recurrent Fuzzy Neural Network to Predict the Runoff of Srepok River -- Comparison of Chaos Driven PSO and Differential Evolution on the Selected PID Tuning Problem -- Improving Rule Selection from Robot Soccer Strategy with Sub strategies -- Novel Ranking Methods Applied to Complex Membership Determination Problems -- Combination of Self Organizing Maps and Growing Neural Gas -- A Survey of Security and Privacy Issues for Biometrics Based Remote Authentication in Cloud -- On the Comparison of the Keystroke Dynamics Databases -- Influence of Eye Diseases on the Retina Pattern Recognition -- Pupil and Iris Detection Algorithm for Near-Infrared Capture Devices -- Query Selectivity Estimation Based on Improved V-optimal Histogram by Introducing Information about Distribution of Boundaries of Range Query Conditions -- Dynamic Centrality for Directed Co-author Network with Context -- Towards a Conceptual Search for Vietnamese Legal Text -- A Vietnamese Question Answering System in Vietnam’s Legal Documents -- An Inner-Enterprise Wiki System (IWkS) Integrated with an Expert Finding Mechanism for Lesson-Learned Knowledge Accumulation in Product Design -- Movie Recommendation Using OLAP and Multidimensional Data Model -- Decision Trees and Their Families in Imbalanced Pattern Recognition: Recognition with and without Rejection -- An Approach for Integrating Multidimensional Database into Context-Aware Recommender System -- Vietnamese Sentence Similarity Based on Concepts -- Materialized View Construction Based on Clustering Technique -- Big Data Spectra Analysis Using Analytical Programming and Random Decision Forests -- Man-Machine Interaction Improvement by Means of Automatic Human Personality Identification -- via RODOS: Monitoring and Visualisation of Current Traffic Situation on Highways -- Computation of Swing-up Signal for Inverted Pendulum Using Dynamic Optimization -- System and Application Scenarios for Disaster Management Processes, the Rainfall-Runoff Model Case Study -- An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse -- Abbreviation Method for Some Jointed Relations in Displaying Genealogy -- Proposing a Novel Architecture of Script Component to Incorporate the Scripting Language Support in SCADA Systems -- Agent-Based Context Management for Service-Oriented Environments -- Event Based Approaches for Solving Multi-mode Resource Constraints Project Scheduling Problem -- Non-cooperative Games Involving Type-2 Fuzzy Uncertainty: An Approach -- Joining Concept’s Based Fuzzy Cognitive Map Model with Moving Window Technique for Time Series Modeling -- Time Series Modeling with Fuzzy Cognitive Maps: Simplification Strategies-The Case of a Posteriori Removal of Nodes and Weights -- An Effective Initialization for ASM-Based Methods -- A Multiple Refinement Approach in Abstraction Model Checking -- Chaos Driven Particle Swarm Optimization with Basic Particle Performance Evaluation – An Initial Study -- Chaos Powered Grammatical Evolution -- Network Anomaly Detection Using Parameterized Entropy -- Universal Central Control of Home Appliances as an Expanding Element of the Smart Home Concepts -- An Off-the-Shelf Platform for Automatic and Interactive Text Messaging Using Short Message Service -- Application of PIL Approach for Automated Transportation Center -- A Model of a System for Stream Data Storage and Analysis Dedicated to Sensor Networks of Embankment Monitoring -- Analysis of Social Influence and Information Dissemination in Social Media: The Case of Twitter -- Multi–criteria Route Planning in Bus Network -- Pattern Recognition and Image Processing Enhanced LBP-Based Face Recognition System Using a Heuristic Approach for Searching Weight Set -- A Local Gaussian Filter and Adaptive Morphology as Tools for Completing Partially Discontinuous Curves -- Subspaces Clustering Approach to Lossy Image Compression -- An Impact of the User and Time Parameters to Sequence Alignment Methods for Process Mining -- An Implementation of a Paper Based Authentication Using HC2D Barcode and Digital Signature -- Grasping Action for Impaired Vision Action Using HC2D Barcode Technology -- Hardware Approach for Generating b-detectors by Immune-Based Algorithms -- Evaluating Industrial Control Devices Security: Standards, Technologies and Challenges -- Protection Profile for Secure Sensitive Information System on Mobile Devices -- Implicit and Explicit Certificates-Based Encryption Scheme -- Malware Behavior Modeling with Colored Petri Nets -- A Proposal of Algorithm for Web Applications Cyber Attack Detection -- Semantic Set Analysis for Malware Detection.

This book constitutes the proceedings of the 13th IFIP TC 8 International Conference on Computer Information Systems and Industrial Management, CISIM 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 60 paper presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: algorithms; biometrics and biometrics applications; data analysis and information retrieval; industrial management and other applications; modelling and optimization; networking; pattern recognition and image processing; and various aspects of computer security.

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in