標(biāo)題: Titlebook: Computer and Information Science 2011; Roger Lee Conference proceedings 2011 Springer Berlin Heidelberg 2011 Computational Intelligence.Co [打印本頁(yè)] 作者: Disaster 時(shí)間: 2025-3-21 18:09
書(shū)目名稱Computer and Information Science 2011影響因子(影響力)
書(shū)目名稱Computer and Information Science 2011影響因子(影響力)學(xué)科排名
書(shū)目名稱Computer and Information Science 2011網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Computer and Information Science 2011網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Computer and Information Science 2011被引頻次
書(shū)目名稱Computer and Information Science 2011被引頻次學(xué)科排名
書(shū)目名稱Computer and Information Science 2011年度引用
書(shū)目名稱Computer and Information Science 2011年度引用學(xué)科排名
書(shū)目名稱Computer and Information Science 2011讀者反饋
書(shū)目名稱Computer and Information Science 2011讀者反饋學(xué)科排名
作者: nonchalance 時(shí)間: 2025-3-21 22:24
A Metric-Based Approach for Anti-pattern Detection in UML Designs,ature as violations of various quality rules. Most of these anti-patterns have been defined in terms of code quality metrics. However, identifying anti-patterns at the design level would improve considerably the code quality and substantially reduce the cost of correcting their effects during the co作者: Coordinate 時(shí)間: 2025-3-22 00:42
A Novel Feature Extraction for Facial Expression Recognition via Combining the Curvelet and LDP,attern). First, the low frequency coefficients of Curvelet decomposition on expression region are selected as global facial features. Then, LDP descriptor is used to describe eyes region and mouth region respectively as local facial features. Finally we obtain the fusion of these two different misce作者: Cerebrovascular 時(shí)間: 2025-3-22 08:10
Constructing Maximum-Lifetime Data Gathering Tree without Data Aggregation for Sensor Networks,r nodes have the capability to adjust their transmission power with the transmission range, we approximately construct the maximum lifetime data gathering tree with the goal to balance the energy consumption among the sensor nodes to prolong the lifetime of the network. Our simulation shows that our作者: inquisitive 時(shí)間: 2025-3-22 09:34 作者: Intend 時(shí)間: 2025-3-22 13:58
A Theory of Planned Behavior Perspective on Blog Service Switching, but also can develop relationships with other bloggers or blog visitors. Although many blog services are provided freely, its service switching behavior have attracted much attention from practitioners. Blog service switching is a specific instance of the broader social technology switching phenome作者: Intend 時(shí)間: 2025-3-22 19:33
User Contribution and IT-Enabled Features of Online Review Platforms: A Preliminary Study, services. These review messages become important online information sources affecting consumers’ purchase decision, and thus are essential assets for online review platforms. The survival of platforms largely depends on a number of users’ voluntary contribution of online reviews. In this study, we 作者: wreathe 時(shí)間: 2025-3-22 21:24 作者: 絕食 時(shí)間: 2025-3-23 04:39
Integrating Business Process Analysis and Complex Event Processing,ll a lack for a meaningful integration between business analysis and process modeling activities. The event-driven paradigm has been shown to be an effective solution for the implementation of process rules. However, the connection between the business side of the rules and their software implementa作者: 人類的發(fā)源 時(shí)間: 2025-3-23 06:26
3D NAT Scheme for Realizing Seamless End-to-End Connectivity and Addressing Multilevel Nested Netwoork (LAN) based internal addresses are all disguised behind one publicly accessible NATenabled router, it is virtually impossible for public hosts to initiate a connection to a specific private host. This in turn adversely affects the NAT enabled network’s ability to support VOIP, Video conferencing作者: 事物的方面 時(shí)間: 2025-3-23 12:31
Maximizing Coverage Degree Based on Event Patterns in Wireless Sensor Networks,erature, sound, vibration, light, humidity, etc. Spanning health, home, environmental and military areas are some potential applications of WSNs. In several situations, events sensed by nodes occur on special geographical pattern. This paper proposed a new routing algorithm schema based on event occ作者: 凝結(jié)劑 時(shí)間: 2025-3-23 14:26 作者: 白楊 時(shí)間: 2025-3-23 21:02 作者: emulsify 時(shí)間: 2025-3-23 22:41 作者: 修剪過(guò)的樹(shù)籬 時(shí)間: 2025-3-24 05:47 作者: 有權(quán) 時(shí)間: 2025-3-24 07:41 作者: 壯麗的去 時(shí)間: 2025-3-24 12:06 作者: Fracture 時(shí)間: 2025-3-24 15:52 作者: aphasia 時(shí)間: 2025-3-24 19:03 作者: Observe 時(shí)間: 2025-3-25 01:09
Cardinal Virtues of Academic Administration,llaneous features for facial expression and this combination makes use of Curvelet and LDP their respective characteristics in global and local features simultaneously. A simple NN (Nearest Neighbor) classifier is used on the JAFFE and Cohn-Kanade these two benchmark databases to show the effectiveness.作者: HAWK 時(shí)間: 2025-3-25 07:20
The Ethical Dimensions of Global Changeurrence pattern to satisfying k-coverage of event paths and maintaining degree of coverage in maximum level as more as possible. This method improves the network lifetime by shifting the routing responsibility from covering nodes to communication nodes, while maximizing the degree of coverage in the main path of events.作者: hypertension 時(shí)間: 2025-3-25 07:52
The Ethical Foundations of Early Daoismnetic algorithm on the traveling salesman problem is specially designed to run on CPU. Then a corresponding CUDA program is developed for performance comparison. The experimental results indicate that a sequential genetic algorithm with intensive interactions can be accelerated by being translated into CUDA code for GPU execution.作者: SLUMP 時(shí)間: 2025-3-25 11:40
A Novel Feature Extraction for Facial Expression Recognition via Combining the Curvelet and LDP,llaneous features for facial expression and this combination makes use of Curvelet and LDP their respective characteristics in global and local features simultaneously. A simple NN (Nearest Neighbor) classifier is used on the JAFFE and Cohn-Kanade these two benchmark databases to show the effectiveness.作者: 熱情贊揚(yáng) 時(shí)間: 2025-3-25 17:05
Maximizing Coverage Degree Based on Event Patterns in Wireless Sensor Networks,urrence pattern to satisfying k-coverage of event paths and maintaining degree of coverage in maximum level as more as possible. This method improves the network lifetime by shifting the routing responsibility from covering nodes to communication nodes, while maximizing the degree of coverage in the main path of events.作者: 灌溉 時(shí)間: 2025-3-25 23:27 作者: 欺騙手段 時(shí)間: 2025-3-26 03:08 作者: 彎曲道理 時(shí)間: 2025-3-26 04:53 作者: Cirrhosis 時(shí)間: 2025-3-26 12:06
Ethics in Financial Institutions, format can be a flag of programming performance. It seems that there is no direct correlation between the frequency of keystrokes and the quality of programs. We think monitoring low-level keystrokes could provide a way to study cognitive activity of programmers.作者: CAMEO 時(shí)間: 2025-3-26 13:51
A Metric-Based Approach for Anti-pattern Detection in UML Designs,newly defined quality metrics. Operating at the design level, our approach examines structural and behavioral information through the class and sequence diagrams. It is illustrated through five, well-known anti-patterns: Blob, Lava Flow, Functional Decomposition, Poltergeists, and Swiss Army Knife.作者: glans-penis 時(shí)間: 2025-3-26 17:37
An Empirical Study of Programming Performance Based on Keystroke Characteristics, format can be a flag of programming performance. It seems that there is no direct correlation between the frequency of keystrokes and the quality of programs. We think monitoring low-level keystrokes could provide a way to study cognitive activity of programmers.作者: Ethics 時(shí)間: 2025-3-26 22:33 作者: IST 時(shí)間: 2025-3-27 01:44 作者: 相符 時(shí)間: 2025-3-27 08:04
The Ethical Dimensions of Global Changee findings confirm that social networking technology and virtual community technology provide helpful IT-enabled features to attain a high level of user contribution on the platform. Implications for both researchers and practitioners are discussed.作者: epidermis 時(shí)間: 2025-3-27 11:14
Ecological Change and Political Crisisr associated network geometry. This paper contains a detail description of the Fuzzy12 algorithm, its implementation and the set-up of the EDG simulation. Our simulation results demonstrate that the Fuzzy algorithm outperforms the LRU replacement algorithm with different perspective, for example, hit ratio, byte hit ratio, miss rate etc.作者: motor-unit 時(shí)間: 2025-3-27 15:10 作者: inflame 時(shí)間: 2025-3-27 17:52 作者: Pathogen 時(shí)間: 2025-3-27 23:33
The Ethical Dimensions of Global Changen implementation is built based on this specification. In addition, we also discuss a priority upgrading approach to handle possible starvation situation of low-priority data items in the priority queue.作者: infinite 時(shí)間: 2025-3-28 05:43
International Justice and Global Warmingcentrality indices, we found that the neocortical hubs of the network were distributed in the sense and motor cortex, and the nodes in the thalamus and lentiform nucleus held the largest betweenness. The sense and motor cortices as well as thalamus and lentiform nucleus have the important roles in dispatch and transfer information of network.作者: 口訣 時(shí)間: 2025-3-28 09:23 作者: BARGE 時(shí)間: 2025-3-28 11:43 作者: 事先無(wú)準(zhǔn)備 時(shí)間: 2025-3-28 16:09
The Ethical Foundations of Early Daoismink available bandwidth of a network. The experiment result indicates that, after applying the object snapshot concept of software, RichMap can smoothly capture and present complete router-level snapshots and significantly decrease the network load that it generates.作者: 神秘 時(shí)間: 2025-3-28 18:50
Applying Bounded Model Checking to Verifying Web Navigation Model,sually manifest in a small number of navigation model. In this paper, to overcome these two challenges, we primarily present an On-the-fly approach to modeling the Web navigation behaviors, and apply bounded model checking (BMC) to verifying the On-the-fly navigation model. Finally, a prototype system is discussed.作者: Ligneous 時(shí)間: 2025-3-28 22:59
User Contribution and IT-Enabled Features of Online Review Platforms: A Preliminary Study,e findings confirm that social networking technology and virtual community technology provide helpful IT-enabled features to attain a high level of user contribution on the platform. Implications for both researchers and practitioners are discussed.作者: 愛(ài)管閑事 時(shí)間: 2025-3-29 03:22
Implementation and Performance Analysis of Fuzzy Replica Replacement Algorithm in Data Grid,r associated network geometry. This paper contains a detail description of the Fuzzy12 algorithm, its implementation and the set-up of the EDG simulation. Our simulation results demonstrate that the Fuzzy algorithm outperforms the LRU replacement algorithm with different perspective, for example, hit ratio, byte hit ratio, miss rate etc.作者: 暗語(yǔ) 時(shí)間: 2025-3-29 09:52 作者: 訓(xùn)誡 時(shí)間: 2025-3-29 11:59
3D NAT Scheme for Realizing Seamless End-to-End Connectivity and Addressing Multilevel Nested Netwot tends to realize the above situation by proposing a three dimensional network address translation scheme with a tentative capability to support end-to-end connectivity based applications and at the same time retaining the benefits of conventional NAT model.作者: tenuous 時(shí)間: 2025-3-29 16:22
Formal Specification and Implementation of Priority Queue with Starvation Handling,n implementation is built based on this specification. In addition, we also discuss a priority upgrading approach to handle possible starvation situation of low-priority data items in the priority queue.作者: 要控制 時(shí)間: 2025-3-29 23:35
Brain Functional Network for Chewing of Gum,centrality indices, we found that the neocortical hubs of the network were distributed in the sense and motor cortex, and the nodes in the thalamus and lentiform nucleus held the largest betweenness. The sense and motor cortices as well as thalamus and lentiform nucleus have the important roles in dispatch and transfer information of network.作者: Morbid 時(shí)間: 2025-3-30 02:11
Effects of Value-Based Mechanism in Online Advertisement Auction, auctioneer’s profit in comparison between normal GSP, normal VCG (Vickrey-Clarke-Groves Mechanism) and our proposed mechanism. The contribution of our research includes to clarify the features and advantages of advertisement auctions and effects to website owner’s profit rate.作者: Thyroxine 時(shí)間: 2025-3-30 04:39 作者: 震驚 時(shí)間: 2025-3-30 09:26
Computer Network Reverse Engineering,ink available bandwidth of a network. The experiment result indicates that, after applying the object snapshot concept of software, RichMap can smoothly capture and present complete router-level snapshots and significantly decrease the network load that it generates.作者: Tractable 時(shí)間: 2025-3-30 14:31 作者: multiply 時(shí)間: 2025-3-30 18:09
Ecological Change and Political Crisisof costs (sunk costs and relationship costs) exert influence in determining bloggers’ switching behavior. Discussions and implications are provided to better understand the switching behavior of blog and other social technologies.作者: 猛擊 時(shí)間: 2025-3-30 22:39
The Ethical Dimensions of Global Change available tourism information systems and can be seamlessly connected to the information systems in a dynamic way. Consequently, a successively optimized operating mechanism of value chain and a management, service and marketing system can be constructed. As a theoretical creation, the research exp作者: 不給啤 時(shí)間: 2025-3-31 00:51 作者: OFF 時(shí)間: 2025-3-31 06:46
A Theory of Planned Behavior Perspective on Blog Service Switching,of costs (sunk costs and relationship costs) exert influence in determining bloggers’ switching behavior. Discussions and implications are provided to better understand the switching behavior of blog and other social technologies.作者: Osteons 時(shí)間: 2025-3-31 09:15
Research on Dynamic Optimized Approach of Value Chain in Tourist Destinations, available tourism information systems and can be seamlessly connected to the information systems in a dynamic way. Consequently, a successively optimized operating mechanism of value chain and a management, service and marketing system can be constructed. As a theoretical creation, the research exp作者: negligence 時(shí)間: 2025-3-31 13:37 作者: 2否定 時(shí)間: 2025-3-31 21:36
Conference proceedings 2011earch results..?.The purpose of the 10.th. IEEE/ACIS International Conference on Computer and Information Science (ICIS 2011) was held on May16-18, 2011 in Sanya, Hainan Island, China is to bring together scientist, engineers, computer users, students to share their experiences and exchange new idea作者: Affirm 時(shí)間: 2025-4-1 01:18
https://doi.org/10.1007/978-3-642-21378-6Computational Intelligence; Computer Science; Information Science作者: 胰島素 時(shí)間: 2025-4-1 02:15
978-3-642-26816-8Springer Berlin Heidelberg 2011作者: 灰姑娘 時(shí)間: 2025-4-1 06:56
Computer and Information Science 2011978-3-642-21378-6Series ISSN 1860-949X Series E-ISSN 1860-9503 作者: 神秘 時(shí)間: 2025-4-1 12:45
On the Social Responsibility of Banking,r nodes have the capability to adjust their transmission power with the transmission range, we approximately construct the maximum lifetime data gathering tree with the goal to balance the energy consumption among the sensor nodes to prolong the lifetime of the network. Our simulation shows that our approach is effective.