000 03841nam a22005895i 4500
001 978-3-319-29817-7
003 DE-He213
005 20200420221251.0
007 cr nn 008mamaa
008 160330s2016 gw | s |||| 0|eng d
020 _a9783319298177
_9978-3-319-29817-7
024 7 _a10.1007/978-3-319-29817-7
_2doi
050 4 _aQA76.758
072 7 _aUMZ
_2bicssc
072 7 _aCOM051230
_2bisacsh
082 0 4 _a005.1
_223
245 1 0 _aMathematical and Engineering Methods in Computer Science
_h[electronic resource] :
_b10th International Doctoral Workshop, MEMICS 2015, Telč, Czech Republic, October 23-25, 2015, Revised Selected Papers /
_cedited by Jan Kofroň, Tom�aš Vojnar.
250 _a1st ed. 2016.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aIX, 157 p. 51 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v9548
505 0 _aProgramming Support for Future Parallel Architectures -- Flexible Interpolation for Efficient Model Checking -- Understanding Transparent and Complicated Users as Instances of Preference Learning for Recommender Systems -- Span-Program-Based Quantum Algorithms for Graph Bipartiteness and Connectivity -- Fitting Aggregation Operators -- Practical Exhaustive Generation of Small Multiway Cuts in Sparse Graphs -- Self-adaptive Architecture for Multi-sensor Embedded Vision System -- Exceptional Configurations of Quantum Walks with Grover's Coin -- Performance Analysis of Distributed Stream Processing Applications Through Colored Petri Nets -- GPU-Accelerated Real-Time Mesh Simplification Using Parallel Half Edge Collapses -- Classifier Ensemble by Semi-supervised Learning: Local Aggregation Methodology -- The Challenge of Increasing Safe Response of Antivirus Software Users -- Weak Memory Models as LLVM-to-LLVM Transformations.
520 _aThis volume contains the post-conference proceedings of the 10th Doctoral Workshop on Mathematical and Engineering Methods in Computer Science, MEMICS 2015, held in Tel&#x10D;, Czech Republic, in October 2015. The 10 thoroughly revised full papers were carefully selected out of 25 submissions and are presented together with 3 invited papers. The topics covered include: security and safety, bioinformatics, recommender systems, high-performance and cloud computing, and non-traditional computational models (quantum computing, etc.).<ioinformatics, recommender="" systems,="" high-performance="" and="" cloud="" computing,="" non-traditional="" computational="" models="" (quantum="" etc.).
650 0 _aComputer science.
650 0 _aComputer communication systems.
650 0 _aSoftware engineering.
650 0 _aAlgorithms.
650 0 _aBioinformatics.
650 0 _aManagement information systems.
650 1 4 _aComputer Science.
650 2 4 _aSoftware Engineering.
650 2 4 _aComputer Communication Networks.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aInformation Systems Applications (incl. Internet).
650 2 4 _aComputational Biology/Bioinformatics.
700 1 _aKofro&#x148;, Jan.
_eeditor.
700 1 _aVojnar, Tom�a&#x161;.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783319298160
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v9548
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-29817-7
912 _aZDB-2-SCS
912 _aZDB-2-LNC
942 _cEBK
999 _c52615
_d52615