派博傳思國際中心

標(biāo)題: Titlebook: Computer and Information Sciences - ISCIS 2004; 19th International S Cevdet Aykanat,Tu?rul Dayar,?brahim K?rpeo?lu Conference proceedings 2 [打印本頁]

作者: 淹沒    時間: 2025-3-21 17:13
書目名稱Computer and Information Sciences - ISCIS 2004影響因子(影響力)




書目名稱Computer and Information Sciences - ISCIS 2004影響因子(影響力)學(xué)科排名




書目名稱Computer and Information Sciences - ISCIS 2004網(wǎng)絡(luò)公開度




書目名稱Computer and Information Sciences - ISCIS 2004網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computer and Information Sciences - ISCIS 2004被引頻次




書目名稱Computer and Information Sciences - ISCIS 2004被引頻次學(xué)科排名




書目名稱Computer and Information Sciences - ISCIS 2004年度引用




書目名稱Computer and Information Sciences - ISCIS 2004年度引用學(xué)科排名




書目名稱Computer and Information Sciences - ISCIS 2004讀者反饋




書目名稱Computer and Information Sciences - ISCIS 2004讀者反饋學(xué)科排名





作者: arboretum    時間: 2025-3-21 22:22

作者: 預(yù)兆好    時間: 2025-3-22 02:37
Computer and Information Sciences - ISCIS 2004978-3-540-30182-0Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: callous    時間: 2025-3-22 05:58
Survival: An Introductory Essay,lated previous work as well as our own efforts in finding useful algrithms to handle this problem. The work we present uses a set of representations, including hair strands, clusters and strips, that are derived from the same underlying base skeleton, where this skeleton is animated by physical, i.e., spring, forces.
作者: instructive    時間: 2025-3-22 10:30
Springer Series in Social Psychologyteria based on power utilization, reliability and security. In this paper we suggest a theoretical framework for the characterization and comparison of adaptive routing algorithms which use QoS as the criterion to select between different paths that connections may take from sources to destinations.
作者: Coma704    時間: 2025-3-22 14:18
Ethical Dilemmas in Social Researchation performance at a high degree. In this paper, to increase classification accuracy, it is aimed to minimize the effect of this problem by developing an Attribute Weighted Artificial Immune System (AWAIS). To evaluate the performance of proposed system, aiNet, an algorithm that have a considerabl
作者: Coma704    時間: 2025-3-22 17:03

作者: AXIS    時間: 2025-3-22 21:12

作者: Chronic    時間: 2025-3-23 04:26
The Aesthetic Objection to Terraforming Marstroduced for the solution of wall-following robot problem. Ants construct their navigations by retrieving linear path segments, called trunks, from the external memory. Selection of trunks from lists of available candidates is made using a Greedy Randomized Adaptive Search Procedure (GRASP) instead
作者: 流出    時間: 2025-3-23 09:20
The Ethics of Space Explorations in medical decision making cases. A local k-nearest neighbor (k-NN), piecewise decision tree C4.5 and CART algorithms, global multilayer perceptron (MLP), mixture of experts (ME) algorithm based on normalized radial basis function (RBF) net and boundary-optimized support vector machines (SVM) algo
作者: 節(jié)省    時間: 2025-3-23 12:38
James S. J. Schwartz,Tony Milliganrally so huge that selection of interesting ones among all discovered rules becomes an important task. At each period, using the newly gath ered information from the domain, the new classification rules are induced. Therefore, these rules stream through time and are so called streaming classificatio
作者: aqueduct    時間: 2025-3-23 15:36
Space Colonies and Their Criticsintegrates fuzzy, active and deductive rules with database objects. However, the behavior of a system can be unpredictable due to the rules triggering or untriggering each other (non-termination). Intermediate and final database states may also differ according to the order of rule executions (non-c
作者: 眉毛    時間: 2025-3-23 21:40
James S. J. Schwartz,Tony Milligan predict the structural class of a protein from its Amino Acid Composition (AAC) using Support Vector Machines (SVM). A protein can be represented by a 20 dimensional vector according to its AAC. In addition to the AAC, we have used another feature set, called the Trio Amino Acid Composition (Trio A
作者: Narrative    時間: 2025-3-24 00:53
Assessing the Unconditional Stake,r using texturing techniques, the vectorized crack-like pattern is used. Given a crack-like pattern, basic image processing operations are applied to extract the feature pattern, and the redundant vertices are removed in the simplification process. The pattern is transformed onto the surface of para
作者: 掙扎    時間: 2025-3-24 04:42
Assessing the Unconditional Stake,le hardware-accelerated occlusion queries using the concept of eye-siding number for dynamic scene is proposed. Organizing the regular grid with overlapping voxels for the scene as an octree-like hierarchy, the actual position of dynamical objects can be updated efficiently. Based on the eye-siding
作者: critique    時間: 2025-3-24 09:57
,Rorty’s Contribution to Postmodern Ethics,gorithm that provides high-quality images and reduces rendering time regardless of viewing condition by using depth-subsampling scheme. It partitions image plane into several uniform pixel blocks, then computes minimum depth for each pixel block. While conventional ray casting starts ray traversal f
作者: Ascribe    時間: 2025-3-24 13:37

作者: flimsy    時間: 2025-3-24 16:06

作者: 蓋他為秘密    時間: 2025-3-24 21:28

作者: Obstreperous    時間: 2025-3-25 00:34
Survival: An Introductory Essay,lex software engineering enterprise which can benefit from additional tools that enables to developers to manage the complexity of the development process. We describe visual interface and a development environment, for developing finite state language processing applications using the Xerox Finite
作者: enfeeble    時間: 2025-3-25 05:27
https://doi.org/10.1007/978-3-030-83422-7 the network dynamically by measuring . and . values. By taking the available bandwidth as an upper limit, the sender adjusts its output rate accordingly. While increasing the quality of the video, using a bandwidth estimator instead of probing prevents the congestion generated by the streaming appl
作者: 放縱    時間: 2025-3-25 08:48
https://doi.org/10.1007/978-3-030-83422-7ork attacks have been increased during last decades. To detect these network attacks, a variety of schemes are developed by several companies and organizations. But, many previous schemes are known to have some weakness in protecting important hosts from network attacks because of their inherent unc
作者: 步兵    時間: 2025-3-25 12:37
Survival: An Introductory Essay,r (P2P) overlay in mobile ad hoc networks (MANET). DHT systems are useful for resource restrained MANET devices due to the relatively low communication overhead. However, the overlay routing for service discovery is very inefficient, since overlay structure is independent of physical network topolog
作者: MAPLE    時間: 2025-3-25 19:23

作者: Prosaic    時間: 2025-3-25 23:50
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/234375.jpg
作者: Cloudburst    時間: 2025-3-26 03:35

作者: Scintigraphy    時間: 2025-3-26 04:23
https://doi.org/10.1007/978-3-030-83422-7laying the normal stimulation to the skin and the skin stretch. The proposed systems are expected to be used as new human computer interfaces by presenting rea listic haptic interaction in ecommerce or VR environment.
作者: scotoma    時間: 2025-3-26 12:14

作者: exceptional    時間: 2025-3-26 14:08

作者: innovation    時間: 2025-3-26 16:51
Interactive Mouse Systems Providing Haptic Feedback During the Exploration in Virtual Environmentlaying the normal stimulation to the skin and the skin stretch. The proposed systems are expected to be used as new human computer interfaces by presenting rea listic haptic interaction in ecommerce or VR environment.
作者: MURKY    時間: 2025-3-26 23:22
Proximity-Based Overlay Routing for Service Discovery in Mobile Ad Hoc Networkscut generated from the service description duplication. In a detailed ns-2 simulation study, we show that the proposed scheme achieves approximately shortest physical path without additional communication overhead, and also find that it works well in the mobile environment.
作者: Obituary    時間: 2025-3-27 02:33
The Aesthetic Objection to Terraforming Marsof pure Greedy heuristic as used in traditional ACO algorithms. The proposed algorithm is tested for several arbitrary rectilinearly shaped room environments with random initial direction and position settings. It is experimentally shown that this novel approach leads to good navigations within reasonable computation times.
作者: 文藝    時間: 2025-3-27 08:56

作者: Flagging    時間: 2025-3-27 13:13
,Habermas’ Ethics of Intersubjectivity, that has maximum depth in current frame. Camera position is determined by using the center of gravity of organ’s cross-section. Entire camera path can be constructed by applying the operation in every frame. It doesn’t require preprocessing and extra storage since it depends only on image-space information generated in rendering time.
作者: 帶來的感覺    時間: 2025-3-27 15:21

作者: 使害羞    時間: 2025-3-27 18:50
Springer Series in Social Psychology Therefore, to reduce the process time, in other words, to avoid from the highly mathematical computational structure of GPC, a neural network was designed for a 3-Joint robot. The performance of the designed control system was shown to be successful using the simulation software, which includes the dynamics and kinematics of the robot model.
作者: 支形吊燈    時間: 2025-3-28 00:01

作者: GIST    時間: 2025-3-28 06:04
Space Colonies and Their Criticsof the termination property without requiring any extra construct. In addition, with our proposed fuzzy inference algorithm, we guarantee confluent rule executions. The techniques and solutions provided in this study can be utilized in various complex systems, such as weather forecasting applications and environmental information systems.
作者: capillaries    時間: 2025-3-28 07:38

作者: 察覺    時間: 2025-3-28 12:20
Assessing the Unconditional Stake,d on reference points generation mechanism, crack-like patterns can be effectively and flexibly presented on the 3D objects. By the proposed hardware accelerated mechanism using stencil buffer, the interactivity of pattern presentation can be achieved on the fly.
作者: abreast    時間: 2025-3-28 15:56

作者: Liability    時間: 2025-3-28 20:00
Survival: An Introductory Essay,, treating simpler regular expressions as “Lego Blocks.” It also enables the visualization of the topology of the regular expression components at different levels of granularity, enabling a user to easily understand and track the structural and functional relationships among the components involved.
作者: 委派    時間: 2025-3-29 01:26
https://doi.org/10.1007/978-3-030-83422-7. Therefore, to filter out only abnormal network traffic, step-by-step filtering capabilities are required. In this paper, we propose a framework for controlling abnormal network traffic. This framework is implemented through the CBQ and iptables mechanisms in Linux kernel.
作者: 逃避系列單詞    時間: 2025-3-29 04:14
Model Based Intelligent Control of a 3-Joint Robotic Manipulator: A Simulation Study Using Artificia Therefore, to reduce the process time, in other words, to avoid from the highly mathematical computational structure of GPC, a neural network was designed for a 3-Joint robot. The performance of the designed control system was shown to be successful using the simulation software, which includes the dynamics and kinematics of the robot model.
作者: avenge    時間: 2025-3-29 08:03
The Effects of Data Properties on Local, Piecewise, Global, Mixture of Experts, and Boundary-Optimizdiscrimination case with a med ium data size N and an intranatal hypoxia monitoring case with a reasonably large data size individual classification cases. Normalized RBF, MLP classifiers give good results in the studied decision making cases. The parameter setting of SVM is adjustable to various receiver operating characteristics (ROC).
作者: Flagging    時間: 2025-3-29 12:27
Using Fuzzy Petri Nets for Static Analysis of Rule-Basesof the termination property without requiring any extra construct. In addition, with our proposed fuzzy inference algorithm, we guarantee confluent rule executions. The techniques and solutions provided in this study can be utilized in various complex systems, such as weather forecasting applications and environmental information systems.
作者: 認(rèn)識    時間: 2025-3-29 16:20
Protein Structural Class Determination Using Support Vector Machinesng a SVM as the classification tool, in predicting the structural class of a protein. According to the Jackknife test results, Trio AAC feature set shows better classification performance than the AAC feature.
作者: 藥物    時間: 2025-3-29 19:48

作者: 救護(hù)車    時間: 2025-3-30 01:34

作者: 項目    時間: 2025-3-30 04:20

作者: MAG    時間: 2025-3-30 10:59

作者: laceration    時間: 2025-3-30 13:56

作者: Mitigate    時間: 2025-3-30 18:54
Robert F. Boruch,Joe Shelby Cecilext on the performance of the PPM approach. Results show that, more recent and larger training texts help decrease the compression rate, which, in turn, leads to increased success in author recognition. Comparing the effects of the recency and the size of the training text, we see that the size factor plays a more dominant role on the performance.
作者: cumber    時間: 2025-3-30 22:46
Investigating the Effects of Recency and Size of Training Text on Author Recognition Problemext on the performance of the PPM approach. Results show that, more recent and larger training texts help decrease the compression rate, which, in turn, leads to increased success in author recognition. Comparing the effects of the recency and the size of the training text, we see that the size factor plays a more dominant role on the performance.
作者: infatuation    時間: 2025-3-31 03:18

作者: Vaginismus    時間: 2025-3-31 07:07
Acceleration of Perspective Volume Rendering Using Depth-Subsamplrom its corresponding pixel, rays in our method can jump as the amount of the minimum z-value calculated. It can also be applied to space-leaping method. Experimental results show that our method produces high-quality images as those of volume ray casting and takes less time for rendering.
作者: 語言學(xué)    時間: 2025-3-31 12:18
An Efficient Camera Path Computation Using Image-Space Information in Virtual Endoscopy that has maximum depth in current frame. Camera position is determined by using the center of gravity of organ’s cross-section. Entire camera path can be constructed by applying the operation in every frame. It doesn’t require preprocessing and extra storage since it depends only on image-space information generated in rendering time.
作者: Fulminate    時間: 2025-3-31 15:08
Bandwidth-Aware Scaling for Internet Video Streamingication itself. The results of the bandwidth-aware algorithm are compared with that of a similar algorithm with no bandwidth-aware scaling and the improvement is demonstrated with measurements taken over WAN.
作者: 新義    時間: 2025-3-31 21:29

作者: Engaging    時間: 2025-3-31 22:29

作者: 谷物    時間: 2025-4-1 05:14
A New Classifier Based on Attribute Weighted Artificial Immune System (AWAIS)ation performance at a high degree. In this paper, to increase classification accuracy, it is aimed to minimize the effect of this problem by developing an Attribute Weighted Artificial Immune System (AWAIS). To evaluate the performance of proposed system, aiNet, an algorithm that have a considerabl
作者: muscle-fibers    時間: 2025-4-1 06:01





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
左贡县| 乾安县| 永川市| 乌拉特中旗| 双鸭山市| 拉孜县| 博罗县| 连城县| 新和县| 丰宁| 乌拉特后旗| 大方县| 安阳县| 临江市| 枝江市| 随州市| 阳春市| 山阳县| 永年县| 望都县| 洛隆县| 庐江县| 宝应县| 收藏| 华亭县| 林周县| 睢宁县| 镇坪县| 蕉岭县| 外汇| 武功县| 南丰县| 朝阳县| 喀喇| 南安市| 宜都市| 海口市| 拜泉县| 茂名市| 洛浦县| 吉林省|