Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
Recent research in Computer and Information Science
Edited outcome of the 12th ACIS/IEEE International Conference on Computer and Information Science ICIS, held June 17-19, 2013, in Niigata, Japan
Written by experts in the field
This edited book presents scientific results of the 12th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2013) which was held on June 16-20, 2013 in Toki Messe, Niigata, Japan. The aim of this conference was to bring together scientists, engineers, computer users, and students to share their experiences and exchange new ideas, research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them
The conference organizers selected the best 20 papers from those papers accepted for presentation at the conference. The papers were chosen based on review scores submitted by members of the program committee, and underwent further rigorous rounds of review.
Content Level »Research
Keywords »12th ACIS/IEEE - 12th ACIS/IEEE International Conference - Computational Intelligence - Computer Science - ICIS 2013 - Information Science
Drivers’ Behaviour Modelling for Virtual Worlds.- Making Existing Reactive Systems Anticipatory.- Observations on Software Testing and Its Optimization.- Semantic Specialization in Graph-Based Data Model.- Wearable Context Recognition for Distance Learning Systems: A Case Study in Extracting User.- An IDS Visualization System for Anomalous Warning Events.- Affective Core-Banking Services For.- Shadow Detection Method based on Shadow Model with Normalized Vector Distance and Edge.- Defect Classiﬁcation of Electronic Board Using Multiple Classiﬁers and Grid Search of SVM Parameters.- Speeding Up Statistical Tests to Detect Recurring Concept.- A Concurrent Tuple Set Architecture for Call Level Interfaces.- Analog Learning Neural Network using Two Stage Mode by Multiple and Sample Hold Circuits.- An Efficient Classification for Single Nucleotide Polymorphism (SNP) Dataset.- Construction Technique of Large Operational Proﬁles for Statistical Software Testing.- Intelligent Web Based on Mathematic Theory.- k Straightening 3-D Surface Scans of Curved Natural History Specimens for Taxonomic Research.- Pipelined Multi-GPU MapReduce for Big-Data Processing.- A Study of Risk Management in Hybrid Cloud Configuration.- Agent-based Social Simulation to Investigate the Occurrence of Pareto Principal in Human Society.- Modeling Value Evaluation of Semantics Aided Secondary Language Acquisition as Model Driven Knowledge Management.