000 | 04784nam a22003735i 4500 | ||
---|---|---|---|
001 | 304430 | ||
003 | MX-SnUAN | ||
005 | 20160429155903.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2011 gw | o |||| 0|eng d | ||
020 |
_a9783642213786 _99783642213786 |
||
024 | 7 |
_a10.1007/9783642213786 _2doi |
|
035 | _avtls000357119 | ||
039 | 9 |
_a201509030555 _bVLOAD _c201405070210 _dVLOAD _y201402191308 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aQ342 | |
100 | 1 |
_aLee, Roger. _eeditor. _9323779 |
|
245 | 1 | 0 |
_aComputer and Information Science 2011 / _cedited by Roger Lee. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2011. |
|
300 |
_axv, 264 páginas _brecurso en línea. |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aStudies in Computational Intelligence, _x1860-949X ; _v364 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aAppling Bounded Model Checking to Verifying Web Navigation Model -- A Metri-Based Approach for Anti-Pattern Detection in UML Designs -- A Novel Feature Extraction for Facial Expresion Recognition Via Combining the Curvelet and LDP -- Constructing Maximum-Lifetime Data Gathering Tree without Data Aggregation for Sensor Networks -- An Empirical Study of Programming Performance Based on Keystroke Characteristics -- A Theory of Planned Behavior Perspective on Blog Service Switching -- User Contribution and IT-Enabled Features of Online Review Platforms: A Preliminary Study -- Implementation and Performance Analysis of Fuzzy Replica Replacement Algorithm in Data Grid -- Integrating Business Process Analysis and Complex Event Processing -- 3D NAT Scheme for Realizing Seamless-End-to-End Connectivity and Addressing Multilevel Nested Networking Address Translation Issues -- Maximizing coverage degree based on event patterns in wireless sensor net-works -- Formal Specification and Implementation of Priority Queue with Starvation Handling -- Brain Functional Network for Chewing of Gum -- Effects of Value-based Mechanism in Online Advertisement Auction -- Research on Dynamic Optimized Approach of Value Chain in Tourist Destinations -- Analysis and Quantitative Calculation on Switching Costs: Taking 2002-2006 China Wireless Telecommunications Market as an Example -- An Empirical Study of Network Topology Inference -- Computer Network Reverse Engineering -- CUDA-based Genetic Algorithm on Traveling Salesman Problem -- Design and Implementation of Sensor Framework for U-Healthcare Services. | |
520 | _aThe series "Studies in Computational Intelligence" (SCI) publishes new developments and advances in the various areas of computational intelligence – quickly and with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life science, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems, and hybrid intelligent systems. Critical to both contributors and readers are the short publication time and world-wide distribution - this permits a rapid and broad dissemination of research results. The purpose of the 10th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2011) was held on May16-18, 2011 in Sanya, Hainan Island, China is to bring together scientist, engineers, computer users, students to share their experiences and exchange new ideas, and research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them The conference organizers selected the best 20 papers from those papers accepted for presentation at the conference in order to publish them in this volume. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review. | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783642213779 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-642-21378-6 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c304430 _d304430 |