標(biāo)題: Titlebook: Computer and Information Science 2009; Roger Lee,Gongzu Hu,Huaikou Miao Book 2009 Springer-Verlag Berlin Heidelberg 2009 algorithms.calcul [打印本頁] 作者: Perforation 時間: 2025-3-21 16:52
書目名稱Computer and Information Science 2009影響因子(影響力)
書目名稱Computer and Information Science 2009影響因子(影響力)學(xué)科排名
書目名稱Computer and Information Science 2009網(wǎng)絡(luò)公開度
書目名稱Computer and Information Science 2009網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer and Information Science 2009被引頻次
書目名稱Computer and Information Science 2009被引頻次學(xué)科排名
書目名稱Computer and Information Science 2009年度引用
書目名稱Computer and Information Science 2009年度引用學(xué)科排名
書目名稱Computer and Information Science 2009讀者反饋
書目名稱Computer and Information Science 2009讀者反饋學(xué)科排名
作者: 談判 時間: 2025-3-21 23:33 作者: Curmudgeon 時間: 2025-3-22 02:01 作者: Suppository 時間: 2025-3-22 05:45
Richard Baskerville,Alina Dulipovici code is generated automatically based on the O-O design results and can be verified by port-level simulation. Proposed ladder logic development framework consists of two phases: First is the design phase. Second is the generation and verification phase. During the first phase, O-O design model is b作者: compel 時間: 2025-3-22 11:42
https://doi.org/10.1057/9781137552105 of laws were enacted that demand the protection of patients’ privacy, approaches for protecting privacy often do not comply with legal requirements or basic security requirements. This paper highlights research directions currently pursued for privacy protection in e-health and evaluates common pse作者: Visual-Acuity 時間: 2025-3-22 13:26
Ettore Bolisanl,Alessandro Oltramarimics is of fundamental importance to internet security where the classes are imbalanced. Alougth there exist many active learning methods, few of them were extended to solve BGP problems. In this paper, avtive learning based on the under-sampling and asymmetric bagging is proposed to classify BGP ro作者: Visual-Acuity 時間: 2025-3-22 20:19
Jean-Pierre Noblet,Eric Simon,Robert Parentlevels of a set of thousands of genes under hundreds of experimental conditions. Traditional clustering algorithms fail to efficiently find clusters of genes that demonstrate similar expression levels in all conditions due to such a high dimensional feature space. Subspace clustering addresses this 作者: Anonymous 時間: 2025-3-22 23:58
Introduction: Setting the Sceneperform topology adaptations to spontaneously create communities with similar semantic interests, so that search requests have a high probability of being satisfied within the local community. For queries which cannot be efficiently solved inside the community, a directory overlay built on Distribut作者: 四指套 時間: 2025-3-23 05:23 作者: evince 時間: 2025-3-23 09:26
Complications during Peritoneal Dialysis,ices in unambiguous and, computer -interpretable form. To support effective verification tools of OWL-S, a formal semantics of the language is highly desirable. In this paper we propose a declarative methodology based on F-logic for modeling OWL-S ontologies, present a formal F-logic semantics of OW作者: thwart 時間: 2025-3-23 12:49
Physiology of Peritoneal Dialysis,two metrics intuitively. However, the rarity and urgency of data block is not considered when the popularity of data block is calculated in the traditional scheduling strategies. That leads to the inferior playback continuity and startup latency. To overcome the drawbacks of the traditional scheduli作者: 種子 時間: 2025-3-23 17:34 作者: 多節(jié) 時間: 2025-3-23 21:44 作者: Explosive 時間: 2025-3-23 23:43
The Essentials of Psychodermatologyr target information systems from evaluated and certified security targets. GEST can choose certified security targets resembling target system according to keywords inputted by users, and detect and correct discordance of templates. By using GEST, designers with a little experience can easily get s作者: 軟弱 時間: 2025-3-24 02:57
https://doi.org/10.1007/978-3-030-45582-83GPP has been widely adopted as an evolution of the GSM system. One of the most appealing features in 3G and Beyond 3G systems is the introduction of many new multimedia services, which often demand performance guarantees. However, there lacks general performance analysis tools that enable service p作者: 收養(yǎng) 時間: 2025-3-24 09:00 作者: 阻礙 時間: 2025-3-24 14:36
Multicomponent Bodies and Mixtures,eople and affects work efficiency significantly. Most previous researches focused on developing spam filtering algorithm, using statistics or data mining approach to develop precise spam rules. However, mail servers may generate new spam rules constantly and mail server will then carry a growing num作者: CLEAR 時間: 2025-3-24 17:13 作者: configuration 時間: 2025-3-24 21:05 作者: GUISE 時間: 2025-3-25 00:00 作者: congenial 時間: 2025-3-25 05:11
https://doi.org/10.1007/978-3-642-01209-9algorithms; calculus; computational intelligence; computer; data mining; database; genetic algorithms; inte作者: 定點 時間: 2025-3-25 10:02 作者: Aura231 時間: 2025-3-25 12:40
Roger Lee,Gongzu Hu,Huaikou MiaoIncludes the best papers of the IEEE/ACIS International Conference on Computer and Information Science (ICIS 2009) held on June 1-3, 2009 in Shanghai, China作者: 貪心 時間: 2025-3-25 19:53
Studies in Computational Intelligencehttp://image.papertrans.cn/c/image/234362.jpg作者: cipher 時間: 2025-3-25 22:46
Book 2009 China is to bring together scientist, engineers, computer users, students to share their experiences and exchange new ideas, and research results about all aspects (theory, applications and tools) of computer and information Science; and to discuss the practical challenges encountered along the way作者: Alopecia-Areata 時間: 2025-3-26 01:58 作者: 責(zé)問 時間: 2025-3-26 06:05 作者: 無關(guān)緊要 時間: 2025-3-26 10:21 作者: 材料等 時間: 2025-3-26 16:31 作者: 針葉 時間: 2025-3-26 16:50 作者: Pudendal-Nerve 時間: 2025-3-26 23:17 作者: Ebct207 時間: 2025-3-27 02:55 作者: Obstreperous 時間: 2025-3-27 07:14
Book 2009 and the solutions adopted to solve them....The conference organizers selected 27 outstanding papers from ICIS 2009, all of which you will find in this volume of Springer’s Studies in Computational Intelligence..作者: colloquial 時間: 2025-3-27 10:23
Jean-Pierre Noblet,Eric Simon,Robert Parentns, vehicles are categorized into crossroads nodes and in-road nodes, and different next-hop node selection algorithms are proposed respectively. Simulations with relatively realistic vehicle movement model and probability-based obstacle model show that GRUV has a higher performance compared with other geocast routing protocol.作者: 剝削 時間: 2025-3-27 14:48 作者: 思想流動 時間: 2025-3-27 19:28
https://doi.org/10.1007/978-3-030-45582-8ses a modelling method that can effectively map such metrics for real measurement usages. The framework and modelling method presented in this paper have been accepted as part of the 3GPP standards for performance evaluation.作者: 記憶 時間: 2025-3-27 22:16 作者: 自制 時間: 2025-3-28 02:51
Geocast Routing in Urban Vehicular Ad Hoc Networks,ns, vehicles are categorized into crossroads nodes and in-road nodes, and different next-hop node selection algorithms are proposed respectively. Simulations with relatively realistic vehicle movement model and probability-based obstacle model show that GRUV has a higher performance compared with other geocast routing protocol.作者: 翅膀拍動 時間: 2025-3-28 09:27 作者: 混亂生活 時間: 2025-3-28 10:26 作者: RAFF 時間: 2025-3-28 15:22 作者: aptitude 時間: 2025-3-28 20:09
Introduction: Setting the Sceneect in terms of interference and routing.Therefore we develop a simulation tool that addresses the goal of analysis and assessment of UMTS TDD opportunistic radio system with ad hoc behaviour in coexistence with a UMTS FDD primary cellular networks.作者: Harness 時間: 2025-3-29 02:28 作者: Externalize 時間: 2025-3-29 07:00 作者: Modicum 時間: 2025-3-29 11:01 作者: Facet-Joints 時間: 2025-3-29 12:41 作者: breadth 時間: 2025-3-29 19:12 作者: 寬大 時間: 2025-3-29 23:12
Kathrin Fahlenbrach,Martin Klimke,Laura Wongurrent business process practices by considering an organization’s business value creation capability as well. It helps an organization set priorities for improving its product production and/or service provisioning using a proven strategy and for developing the capability required to accomplish its business values.作者: 步兵 時間: 2025-3-30 00:15 作者: 吹牛者 時間: 2025-3-30 04:46 作者: pacific 時間: 2025-3-30 09:00 作者: indices 時間: 2025-3-30 14:29
Multicomponent Bodies and Mixtures,approach combining both data mining and statistical test approach. We adopt data mining to generate spam rules and statistical test to evaluate the efficiency of them. By the efficiency of spam rules, only significant rules will be used to classify emails and the rest of rules can be eliminated then for performance improvement.作者: 得罪 時間: 2025-3-30 17:06 作者: 莎草 時間: 2025-3-30 21:09 作者: LUCY 時間: 2025-3-31 02:53
Anti-spam Filter Based on Data Mining and Statistical Test,approach combining both data mining and statistical test approach. We adopt data mining to generate spam rules and statistical test to evaluate the efficiency of them. By the efficiency of spam rules, only significant rules will be used to classify emails and the rest of rules can be eliminated then for performance improvement.作者: instulate 時間: 2025-3-31 06:10 作者: 性滿足 時間: 2025-3-31 11:50
https://doi.org/10.1007/978-3-030-79794-2dly the transformation function is optimized using genetic algorithms with respect to the test image. Experimental results are presented using our developed technique on real images, which are hard to be contrasted by other conventional techniques.作者: 暴發(fā)戶 時間: 2025-3-31 13:59
Modelling Power System Devices, different from the traditional story segmentation from video. The proposed algorithm mainly comprises three steps: potential speaker change detection, speaker change refinement and anchor identification. Experimental results show that the proposed algorithm can achieve satisfactory results with total accuracy of 87.84%.作者: Accede 時間: 2025-3-31 18:18 作者: Narcissist 時間: 2025-3-31 21:51 作者: 最高峰 時間: 2025-4-1 02:55 作者: ANTI 時間: 2025-4-1 08:45 作者: 刻苦讀書 時間: 2025-4-1 11:55
An Optimal Algorithm for Contrast Enhancement of Dark Images Using Genetic Algorithms, quality. The technique consists of two steps. Firstly determine a transform function that stretches the occupied gray scale range for the image secondly the transformation function is optimized using genetic algorithms with respect to the test image. Experimental results are presented using our dev作者: Perceive 時間: 2025-4-1 14:22 作者: 稱贊 時間: 2025-4-1 20:54 作者: 小故事 時間: 2025-4-2 02:15
Object-Oriented Ladder Logic Development Framework Based on the Unified Modeling Language, code is generated automatically based on the O-O design results and can be verified by port-level simulation. Proposed ladder logic development framework consists of two phases: First is the design phase. Second is the generation and verification phase. During the first phase, O-O design model is b作者: Herbivorous 時間: 2025-4-2 03:59 作者: 山羊 時間: 2025-4-2 07:39
Abnormal BGP Routing Dynamics Detection by Active Learning Using Bagging on Neural Networks,mics is of fundamental importance to internet security where the classes are imbalanced. Alougth there exist many active learning methods, few of them were extended to solve BGP problems. In this paper, avtive learning based on the under-sampling and asymmetric bagging is proposed to classify BGP ro作者: 干旱 時間: 2025-4-2 14:53 作者: vertebrate 時間: 2025-4-2 16:22 作者: Collar 時間: 2025-4-2 23:09