000 | 03887nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-662-49017-4 | ||
003 | DE-He213 | ||
005 | 20200421112550.0 | ||
007 | cr nn 008mamaa | ||
008 | 151211s2015 gw | s |||| 0|eng d | ||
020 |
_a9783662490174 _9978-3-662-49017-4 |
||
024 | 7 |
_a10.1007/978-3-662-49017-4 _2doi |
|
050 | 4 | _aQ334-342 | |
050 | 4 | _aTJ210.2-211.495 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aTJFM1 _2bicssc |
|
072 | 7 |
_aCOM004000 _2bisacsh |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aTransactions on Computational Collective Intelligence XIX _h[electronic resource] / _cedited by Ngoc Thanh Nguyen, Ryszard Kowalczyk, Fatos Xhafa. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2015. |
|
300 |
_aXI, 187 p. 65 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v9380 |
|
505 | 0 | _aManagement and Computer Science Synergies: a theoretical framework for context sensitive simulation environment -- Improved Recommendation System Using Friend Relationship in SNS -- Bidirectional Analysis Method of Static XSS Defect Detection Technique Based on Database Query Language -- A Multilevel Security Model for Search Engine over Integrated Data -- Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks -- Enabling Vehicular Data with Distributed Machine Learning -- Enabling Vehicular Data with Distributed Machine Learning -- Adapting Distributed Evolutionary Algorithms to Heterogeneous Hardware -- Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles -- Coarser-Grained Multi-user Searchable Encryption in Hybrid Cloud -- Quantum information splitting based on entangled states -- Zero-tree Wavelet Algorithm joint with Huffman Encoding for Image Compression. | |
520 | _aThese transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence that emerges from the collaboration and competition of many individuals (artificial and/or natural). The application of multiple computational intelligence technologies, such as fuzzy systems, evolutionary computation, neural systems, consensus theory, etc., aims to support human and other collective intelligence and to create new forms of CCI in natural and/or artificial systems. This nineteenth issue contains 11 carefully selected and revised contributions. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aComputers. | |
650 | 0 | _aArtificial intelligence. | |
650 | 0 | _aComputer simulation. | |
650 | 0 | _aComputational intelligence. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aArtificial Intelligence (incl. Robotics). |
650 | 2 | 4 | _aComputational Intelligence. |
650 | 2 | 4 | _aSoftware Engineering. |
650 | 2 | 4 | _aComputation by Abstract Devices. |
650 | 2 | 4 | _aSimulation and Modeling. |
650 | 2 | 4 | _aInformation Systems and Communication Service. |
700 | 1 |
_aNguyen, Ngoc Thanh. _eeditor. |
|
700 | 1 |
_aKowalczyk, Ryszard. _eeditor. |
|
700 | 1 |
_aXhafa, Fatos. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783662490167 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v9380 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-662-49017-4 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c58833 _d58833 |