Limit search to items available for checkout
E-BOOK
Title Computational intelligence, cyber security and computational models / G. Sai Sundara Krishnan [and five others], editors.
Imprint New Delhi ; New York : Springer, [2014]
©2014

Copies/Volumes

LOCATION CALL # STATUS
 Internet  Electronic Book    AVAILABLE
Description 1 online resource (401 pages) : illustrations.
Series Advances in intelligent systems and computing ; v. 246
Advances in intelligent systems and computing ; 246.
Bibliog. Includes bibliographical references and index.
Note Available only to authorized UTEP users.
Online resource; title from PDF title page (ebrary, viewed January 2, 2014).
Subject Computational intelligence -- Simulation methods.
Computer security.
Contents Preface; Organization; Contents; Part IKeynote Address; 1 The Robber Strikes Back; Abstract; 1 ... Introduction; 2 ... Basic Results; 3 ... How Large Can the cc-Number Be?; 4 ... Bipartite Graphs; 5 ... K_{1,m} -Free, Diameter 2 Graphs; Acknowledgments; References; 2 Some Applications of Collective Learning; Abstract; 3 Subconscious Social Computational Intelligence; Abstract; 1 ... Introduction; 2 ... Social Computing Paradigms; 3 ... Subconscious Social Intelligence; 4 ... Requirements for Learning Systems; 5 ... The SandS Project; 6 ... Conclusions; Acknowledgments; References.
4 Modeling Heavy Tails in Traffic Sources for Network Performance EvaluationAbstract; 1 ... Introduction; 2 ... Background; 2.1 Phase-Type Distribution; 2.2 LogPH Distribution; 2.3 Some Classical Heavy-Tailed Distributions; 2.4 Fitting a LogPH Distribution; 3 ... Data Sets and Fitted Models; 3.1 Crovella's WWW Data Set; 3.2 Mobile Web Data Set; 3.3 Comparison of Models; 4 ... Impact on Network Performance; 4.1 The Simulation Experiment; 5 ... Conclusions; References; 5 The Future of Access Control: Attributes, Automation, and Adaptation; Abstract.
6 Optimal Control for an MX/G/1/N + 1 Queue with Two Service ModesAbstract; 1 ... Introduction; 2 ... Description of the Queueing Model; 3 ... The Semi-Markov Decision Model; 3.1 The Value-Iteration Algorithm; 4 ... The Expected One-Step Costs; 5 ... The Expected Interdecision Cost Functions; 5.1 Generating Functions Associated with the Model; 5.2 Generating Functions Associated with X; 6 ... Numerical Results; 7 ... Conclusions; References; Part IIComputational Intelligence; 7 A Novel Approach to Gene Selection of Leukemia Dataset Using Different Clustering Methods; Abstract; 1 ... Introduction; 2 ... Fuzzy C-Means Clustering.
3 ... Modified K-Means Clustering Algorithm4 ... Proposed Approach; 5 ... Experimental Environment; 6 ... Computational Results; 7 ... Conclusion; Acknowledgments; References; 8 A Study on Enhancing Network Stability in VANET with Energy Conservation of Roadside Infrastructures Using LPMA Agent; Abstract; 1 ... Introduction; 2 ... Problem Formulation for MALP Approach; 2.1 Cluster Formation; 2.2 Cluster Head Selection; 2.3 Cluster Head Chaining; 2.4 Information Retrieval Using LPMA Agent; 2.5 Mirroring Effects; 3 ... Performance Evaluations; 4 ... Conclusion; References.
9 An Intuitionistic Fuzzy Approach to Fuzzy Clustering of Numerical DatasetAbstract; 1 ... Introduction; 2 ... Background; 2.1 Intuitionistic Fuzzy Sets; 2.2 Intuitionistic Fuzzy Similarity Measures; 3 ... Related Works; 4 ... Intuitionistic Fuzzy Approach to Fuzzy Clustering; 4.1 Intuitionistic Fuzzification; 4.2 Fuzzy Clustering of IF Data; 5 ... Experimental Analysis; 5.1 Cluster Evaluation Criteria; 5.2 Comparative Analysis on Crisp, Fuzzy, and IF Data; 5.2.1 Hard Cluster Evaluation; 5.2.2 Soft Cluster Evaluation; 5.3 Comparative Analysis on Intuitionistic Fuzzy Similarity Measures; 6 ... Conclusion; References.
Summary This book contains cutting-edge research material presented by researchers, engineers, developers, and practitioners from academia and industry at the International Conference on Computational Intelligence, Cyber Security and Computational Models (ICC3) organized by PSG College of Technology, Coimbatore, India during December 19-21, 2013.
Other Author Krishna, G. Sai Sundara.
Other Title Print version: Krishnan, G Sai Sundara. Computational Intelligence, Cyber Security and Computational Models : Proceedings of ICC3, 2013. Dordrecht : Springer, ©2013 9788132216797