標(biāo)題: Titlebook: Computer and Information Science 2015; Roger Lee Conference proceedings 2016 Springer International Publishing Switzerland 2016 14th ACIS/ [打印本頁] 作者: Combat 時(shí)間: 2025-3-21 20:01
書目名稱Computer and Information Science 2015影響因子(影響力)
書目名稱Computer and Information Science 2015影響因子(影響力)學(xué)科排名
書目名稱Computer and Information Science 2015網(wǎng)絡(luò)公開度
書目名稱Computer and Information Science 2015網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Computer and Information Science 2015被引頻次
書目名稱Computer and Information Science 2015被引頻次學(xué)科排名
書目名稱Computer and Information Science 2015年度引用
書目名稱Computer and Information Science 2015年度引用學(xué)科排名
書目名稱Computer and Information Science 2015讀者反饋
書目名稱Computer and Information Science 2015讀者反饋學(xué)科排名
作者: 帽子 時(shí)間: 2025-3-21 23:33 作者: BOLT 時(shí)間: 2025-3-22 04:07
Acts of Omission in the “War on Terrorism” discrete driving states (i.e., go straights) on the basis of Gaussian Mixture Model (GMM) and plot state transition graphs of the discrete driving states to model driver’s behavior. The driver model obtained by above method showed the characteristic driving behaviors of novice drivers in the simula作者: 萬靈丹 時(shí)間: 2025-3-22 05:13
Introduction: Purpose and Summary, unlikely lead to an error. The likelihood is evaluated using . defined by the user. We enhanced the search engine of JPF to implement DFHS and LTL search. Experimental results show that DFHS performs better than current algorithms for both safety and LTL properties of programs in many cases.作者: Allodynia 時(shí)間: 2025-3-22 10:27
Derrida, Rushdie and the Ethics of Mortalityhability automaton (RA), that relates any of its transitions to a path of the TPTIO. The RA computation takes the TPTIO transitions as a coverage criterion. The transitions of the RA, thus the paths of the TPTIO are used for generating test cases that aim at covering the reachable locations and transitions of the TPAIO.作者: artless 時(shí)間: 2025-3-22 16:15 作者: artless 時(shí)間: 2025-3-22 19:01
Depth-First Heuristic Search for Software Model Checking, unlikely lead to an error. The likelihood is evaluated using . defined by the user. We enhanced the search engine of JPF to implement DFHS and LTL search. Experimental results show that DFHS performs better than current algorithms for both safety and LTL properties of programs in many cases.作者: Dri727 時(shí)間: 2025-3-23 01:02 作者: 暫時(shí)休息 時(shí)間: 2025-3-23 03:01
Instruction Level Loop De-optimization,n TIC6x, a digital signal processor with a compiler supporting instruction level parallelism. The algorithms developed in this paper should help interested readers gain insight especially in the difficult tasks of loop rerolling and software de-pipelining, the necessary steps to decompile loops at instruction level.作者: 流出 時(shí)間: 2025-3-23 08:09 作者: 壓碎 時(shí)間: 2025-3-23 10:34
Architecture for Intelligent Transportation System Based in a General Traffic Ontology,llows interoperability is needed. In this paper an ontology-based system to provide roadside assistance is proposed, providing drivers making decisions in different situations, taking into account information on different traffic-related elements such as routes, traffic signs, traffic regulations and weather elements.作者: Asperity 時(shí)間: 2025-3-23 16:11 作者: 裙帶關(guān)系 時(shí)間: 2025-3-23 21:19 作者: maculated 時(shí)間: 2025-3-23 22:11 作者: WAG 時(shí)間: 2025-3-24 04:51
Conference proceedings 2016hange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them..作者: GOAD 時(shí)間: 2025-3-24 06:33
Ani L. Katchova Ph.D.,Timothy A. Woods Ph.D.ional system. For this purposes, this paper adopts the Common Vulnerability Scoring System (CVSS) and proposes a Meta model for security measure in Web ETL processes enabling security manager to asset anticipated vulnerabilities.作者: Cognizance 時(shí)間: 2025-3-24 10:56 作者: 籠子 時(shí)間: 2025-3-24 17:15 作者: SOB 時(shí)間: 2025-3-24 21:54
https://doi.org/10.1057/9781137001931utomatically adapted to the learner’s profiles that evolve over time and are syntactically, semantically and structurally heterogeneous. An experimental study shows the effectiveness of our architecture.作者: 襲擊 時(shí)間: 2025-3-25 00:51
The Unbearable Lightness of Actsork Facebook. It consists in the extraction of opinion data on Facebook pages (e.g. comments), its pre-processing, sentiment analysis and classification, reformatting and loading into the Data WeBhouse (DWB).作者: HALL 時(shí)間: 2025-3-25 05:34 作者: ectropion 時(shí)間: 2025-3-25 08:31 作者: 不幸的人 時(shí)間: 2025-3-25 15:27 作者: Throttle 時(shí)間: 2025-3-25 15:49
,A Novel Architecture for Learner’s Profiles Interoperability,utomatically adapted to the learner’s profiles that evolve over time and are syntactically, semantically and structurally heterogeneous. An experimental study shows the effectiveness of our architecture.作者: Entrancing 時(shí)間: 2025-3-25 23:56
ETL Design Toward Social Network Opinion Analysis,ork Facebook. It consists in the extraction of opinion data on Facebook pages (e.g. comments), its pre-processing, sentiment analysis and classification, reformatting and loading into the Data WeBhouse (DWB).作者: probate 時(shí)間: 2025-3-26 03:54
1860-949X n Science ICIS 2015 held June 29 – July 1, 2015 in Las Vegas.This edited book presents scientific results of the 14.th. IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015) which was held on June 28 – July 1, 2015 in Las Vegas, USA. The aim of this conference was to bri作者: nonsensical 時(shí)間: 2025-3-26 07:39 作者: lesion 時(shí)間: 2025-3-26 11:33
https://doi.org/10.1057/9780230371125se to apply an approach we developed in a previous work to test the robustness of a very restrictive and important security property, which is non-interference. We consider the case of distributed component-based systems, where avoiding interference can represent a real challenge, especially when exchanging messages between heterogeneous entities.作者: nonradioactive 時(shí)間: 2025-3-26 13:34 作者: 捐助 時(shí)間: 2025-3-26 19:56 作者: misshapen 時(shí)間: 2025-3-26 22:11 作者: investigate 時(shí)間: 2025-3-27 01:07
Yasha Rohwer Ph.D.,Randall Westgren Ph.D.llows interoperability is needed. In this paper an ontology-based system to provide roadside assistance is proposed, providing drivers making decisions in different situations, taking into account information on different traffic-related elements such as routes, traffic signs, traffic regulations and weather elements.作者: PACT 時(shí)間: 2025-3-27 07:52
Charles P. Webel,John A. Arnaldie safe region, query result remains unchanged and a request for recomputation of query does not have to be made to the server. This significantly improves the performance of algorithm because the expensive recomputation is not required as long as the query and data objects are within their respective safe exit points.作者: 逃避責(zé)任 時(shí)間: 2025-3-27 10:43
Acts of Omission in the “War on Terrorism”st and effect sizes. These results indicate that the methods SVM same # (1) and SVM Ward (3) can improve the accuracy of estimating the amount of effort in terms of the mean percentage of predictions that fall within 25?% of the actual value.作者: 同音 時(shí)間: 2025-3-27 16:14
https://doi.org/10.1057/9780230371125eria not used previously such as Davies Bouldin index, and Silhouette index. The multi-SOM algorithm is compared to k-means and Birch methods. Results developed with R language show that it is more efficient than classical clustering methods.作者: 最小 時(shí)間: 2025-3-27 20:53
Conference proceedings 2016as held on June 28 – July 1, 2015 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exc作者: Hectic 時(shí)間: 2025-3-28 01:17
Roger LeeRecent research in Computer and Information Science.Edited outcome of the 14th ACIS/IEEE International Conference on Computer and Information Science ICIS 2015 held June 29 – July 1, 2015 in Las Vegas作者: ALE 時(shí)間: 2025-3-28 02:45
Studies in Computational Intelligencehttp://image.papertrans.cn/c/image/234366.jpg作者: 煉油廠 時(shí)間: 2025-3-28 08:16
Computer and Information Science 2015978-3-319-23467-0Series ISSN 1860-949X Series E-ISSN 1860-9503 作者: 嚴(yán)峻考驗(yàn) 時(shí)間: 2025-3-28 10:25
The Fallacy of “Competition” in Agriculture mobile phones, and digital cameras or in large scale servers. Reasons of so much popularity of flash memory are its characteristics; low power consumption, non-volatility, high performance, shock resistance and portability. However due to some of its hardware characteristics, a software layer calle作者: 試驗(yàn) 時(shí)間: 2025-3-28 16:50
Ani L. Katchova Ph.D.,Timothy A. Woods Ph.D.ey also have to patch up the increasing number of software security vulnerabilities. They need to perform a risk evaluation in order to determine the priority of patching-up vulnerabilities. The use of quantitative security assessment methods enables efficient prioritization of security efforts and 作者: spinal-stenosis 時(shí)間: 2025-3-28 20:20 作者: 死貓他燒焦 時(shí)間: 2025-3-29 01:11 作者: EVICT 時(shí)間: 2025-3-29 06:30
Introduction: Purpose and Summary,g, and discovery capabilities. In these applications, the key relevant feature of the technique is the ability to compare objects (such as documents and queries) based on the semantics of their constituents. These comparisons are carried out in a high-dimensional vector space. That space is generate作者: 輕浮女 時(shí)間: 2025-3-29 11:10 作者: Omnipotent 時(shí)間: 2025-3-29 15:17 作者: Popcorn 時(shí)間: 2025-3-29 18:53 作者: LINE 時(shí)間: 2025-3-29 20:57 作者: ineluctable 時(shí)間: 2025-3-30 03:19 作者: 青少年 時(shí)間: 2025-3-30 05:08
Acts of Omission in the “War on Terrorism” to define the bins: (1) the same amount of data in a bin (SVM same #), (2) the same range for each bin (SVM same range) and (3) the bins made by Ward’s method (SVM Ward). We carry out evaluation experiments to compare the accuracy of the proposed SVM models with that of the .-SVR using Welch’s .-te作者: scrape 時(shí)間: 2025-3-30 12:15
https://doi.org/10.1057/9780230371125rove the testing process of security properties, formal methods of specification are developed to automatically generate tests. In this work, we propose to apply an approach we developed in a previous work to test the robustness of a very restrictive and important security property, which is non-int作者: AVID 時(shí)間: 2025-3-30 13:50 作者: Charitable 時(shí)間: 2025-3-30 17:40 作者: groggy 時(shí)間: 2025-3-30 22:46 作者: Morsel 時(shí)間: 2025-3-31 04:36 作者: Vulnerary 時(shí)間: 2025-3-31 08:09
https://doi.org/10.1007/978-3-319-23467-014th ACIS/IEEE; 14th ICIS; Computational Intelligence; Computer Science; ICIS; ICIS 2015; Information Scie作者: 拋物線 時(shí)間: 2025-3-31 12:08
978-3-319-37379-9Springer International Publishing Switzerland 2016作者: 阻礙 時(shí)間: 2025-3-31 15:04
,: States Aware Fully Associative FTL for Multitasking Environment, mobile phones, and digital cameras or in large scale servers. Reasons of so much popularity of flash memory are its characteristics; low power consumption, non-volatility, high performance, shock resistance and portability. However due to some of its hardware characteristics, a software layer calle作者: 我要威脅 時(shí)間: 2025-3-31 18:29
Security Measures for Web ETL Processes,ey also have to patch up the increasing number of software security vulnerabilities. They need to perform a risk evaluation in order to determine the priority of patching-up vulnerabilities. The use of quantitative security assessment methods enables efficient prioritization of security efforts and 作者: 一個(gè)攪動(dòng)不安 時(shí)間: 2025-3-31 22:52
Automated Negotiating Agent Based on Evolutionary Stable Strategies, agent that is based on the expected utility value at the equilibrium point of an evolutionary stable strategy (ESS). Furthermore, we show the evaluation results of negotiating simulations, and demonstrate that our agent outperforms existing agents under the negotiation rules of the 2014 Internation作者: 柔軟 時(shí)間: 2025-4-1 04:46
Architecture for Intelligent Transportation System Based in a General Traffic Ontology,portation. A crucial element for the success of these systems is that vehicles can exchange information not only among themselves but with other elements in the road infrastructure through different applications. For the success of this exchange of information, a common framework of knowledge that a