Cargando…

Computer Information Systems and Industrial Management 12th IFIP TC 8 International Conference, CISIM 2013, Krakow, Poland, September 25-27, 2013, Proceedings /

This book constitutes the proceedings of the 12th IFIP TC 8 International Conference, CISIM 2013, held in Cracow, Poland, in September 2013. The 44 papers presented in this volume were carefully reviewed and selected from over 60 submissions. They are organized in topical sections on biometric and b...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Saeed, Khalid (Editor ), Chaki, Rituparna (Editor ), Cortesi, Agostino (Editor ), Wierzchoń, Sławomir (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
Edición:1st ed. 2013.
Colección:Information Systems and Applications, incl. Internet/Web, and HCI ; 8104
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-40925-7
003 DE-He213
005 20220114111752.0
007 cr nn 008mamaa
008 130919s2013 gw | s |||| 0|eng d
020 |a 9783642409257  |9 978-3-642-40925-7 
024 7 |a 10.1007/978-3-642-40925-7  |2 doi 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
072 7 |a UKN  |2 thema 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Computer Information Systems and Industrial Management  |h [electronic resource] :  |b 12th IFIP TC 8 International Conference, CISIM 2013, Krakow, Poland, September 25-27, 2013, Proceedings /  |c edited by Khalid Saeed, Rituparna Chaki, Agostino Cortesi, Sławomir Wierzchoń. 
250 |a 1st ed. 2013. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2013. 
300 |a XX, 524 p. 241 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Information Systems and Applications, incl. Internet/Web, and HCI ;  |v 8104 
505 0 |a What is the Value of Information - Search Engine's Point of View -- Application of Combined Classifiers to Data Stream Classification -- Efficacy of Some Primary Discriminant Functions in Diagnosing Planetary Gearboxes -- Biometrics and Bioemetrics Applications Identification of Persons by Virtue of Hand Geometry -- User Authentication for Mobile Devices -- Modified kNN Algorithm for Improved Recognition Accuracy of Biometrics System Based on Gait -- An Application of the Curvature Scale Space Shape Descriptor for Forensic Human Identification Based on Orthopantomograms -- The Impact of Temporal Proximity between Samples on Eye Movement Biometric Identification -- Biomedical Distributed Signal Processing and Analysis -- Effect of Slice Thickness on Texture-Based Classification of Liver Dynamic CT Scans -- Independent Component Analysis for EEG Data Preprocessing - Algorithms Comparison -- An Adequate Representation of Medical Data Based on Partial Set Approximation -- Pattern Recognition and Image Processing Bengali Printed Character Recognition - A New Approach -- Eye Location and Eye State Detection in Facial Images Using Circular Hough Transform -- Recognition of Occluded Faces Based on Multi-subspace Classification -- Mahalanobis Distance-Based Algorithm for Ellipse Growing in Iris Preprocessing -- The Data Exploration System for Image Processing Based on Server-Side Operations -- Image Restoration Using Anisotropic Stochastic Diffusion Collaborated with Non Local Means -- Various Aspects of Computer Security A Practical Certificate and Identity Based Encryption Scheme and Related Security Architecture -- Study of Security Issues in Pervasive Environment of Next Generation Internet of Things -- Security Issues of IPv6 Network Autoconfiguration -- Security Aspects of Virtualization in Cloud Computing -- Threshold Method of Detecting Long-Time TPM Synchronization -- The Removal of False Detections from Foreground Regions Extracted Using Adaptive Background Modelling for a Visual Surveillance System -- Using Backward Induction Techniques in (Timed) Security Protocols Verification -- Telecommunications Networks Risk Assessment with Bayesian Networks -- Power Aware Cluster Based Routing (PACBR) Protocol for Wireless Sensor Network -- A Novel Incentive Based Scheme to Contain Selective Forwarding in Wireless Sensor Network -- Synthetic Social Network Based on Competency-Based Description of Human Resources -- Displaying Genealogy with Adoptions and Multiple Remarriages Using the WHIteBasE -- User Relevance for Item-Based Collaborative Filtering -- Extraction of Agent Groups with Similar Behaviour Based on Agent Profiles -- Aesthetic Patterns from the Perturbed Orbits of Discrete Dynamical Systems -- Weighted Approach to Projective Clustering -- Machine Learning with Known Input Data Uncertainty Measure -- Learning Algorithms in the Detection of Unused Functionalities in SOA Systems -- Construction of Sequential Classifier Using Confusion Matrix -- Growing Neural Gas - A Parallel Approach -- Modified Moment Method Estimator for the Shape Parameter of Generalized Gaussian Distribution for a Small Sample Size -- Trajectory Estimation for Exponential Parameterization and Different Samplings -- Searching in the Structured Space of the Braille Music -- Solving Steel Alloying Using Differential Evolution and SOMA -- The Cost Estimation of Production Orders -- Achieving Desired Cycle Times by Modelling Production Systems -- Artificial Neural Networks as Tools for Controlling Production Systems and Ensuring Their Stability -- Generalized Predictive Control for a Flexible Single-Link Manipulator -- A Disruption Recovery Model in a Production-Inventory System with Demand Uncertainty and Process Reliability. 
520 |a This book constitutes the proceedings of the 12th IFIP TC 8 International Conference, CISIM 2013, held in Cracow, Poland, in September 2013. The 44 papers presented in this volume were carefully reviewed and selected from over 60 submissions. They are organized in topical sections on biometric and biomedical applications; pattern recognition and image processing; various aspects of computer security, networking, algorithms, and industrial applications. The book also contains full papers of a keynote speech and the invited talk. 
650 0 |a Computer networks . 
650 0 |a Application software. 
650 0 |a Pattern recognition systems. 
650 0 |a Software engineering. 
650 0 |a Algorithms. 
650 0 |a Information storage and retrieval systems. 
650 1 4 |a Computer Communication Networks. 
650 2 4 |a Computer and Information Systems Applications. 
650 2 4 |a Automated Pattern Recognition. 
650 2 4 |a Software Engineering. 
650 2 4 |a Algorithms. 
650 2 4 |a Information Storage and Retrieval. 
700 1 |a Saeed, Khalid.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Chaki, Rituparna.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Cortesi, Agostino.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Wierzchoń, Sławomir.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642409264 
776 0 8 |i Printed edition:  |z 9783642409240 
830 0 |a Information Systems and Applications, incl. Internet/Web, and HCI ;  |v 8104 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-40925-7  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)