Mobile intelligence / (Record no. 42279)

000 -LEADER
fixed length control field 09665nam a2201753 i 4500
001 - CONTROL NUMBER
control field 5732776
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20191218152120.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr |n|||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 151221s2010 njua ob 001 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780470579398
Qualifying information electronic
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1002/9780470579398
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)mat05732776
035 ## - SYSTEM CONTROL NUMBER
System control number (IDAMS)0b000064814ebef2
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.59
Item number .M63 2010eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.16
Edition number 22
245 00 - TITLE STATEMENT
Title Mobile intelligence /
Statement of responsibility, etc. edited by Laurence T. Yang ... [et al.].
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, New Jersey :
Name of producer, publisher, distributor, manufacturer Wiley,
Date of production, publication, distribution, manufacture, or copyright notice c2010.
264 #2 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture [Piscataqay, New Jersey] :
Name of producer, publisher, distributor, manufacturer IEEE Xplore,
Date of production, publication, distribution, manufacture, or copyright notice [2010]
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (xx, 695 pages) :
Other physical details illustrations, fichiers HTML et PDF
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Wiley series on parallel and distributed computing ;
Volume/sequential designation 69
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Preface -- Contributors -- Part I Mobile Data and Intelligence -- 1. A Survey of State-of-the-Art Routing Protocols for Mobile Ad Hoc Networks -- 2. Connected Dominating Set for Topology Control in Ad Hoc Networks -- 3. An Intelligent Way to Reduce Channel Under-utilization in Mobile Ad Hoc Networks, -- 4. Mobility in Publish/Subscribe Systems, -- 5. Cross-Layer Design Framework for Adaptive Cooperative Caching in Mobile Ad Hoc Networks -- 6. Recent Advances in Mobile Agent-Oriented Applications -- Part II Location-Based Mobile Information Services -- 7. KCLS: A Cluster-Based Location Service Protocol and Its Applications in Multihop Mobile Networks -- 8. Predictive Location Tracking in Cellular and in Ad Hoc Wireless Networks -- 9. An Efficient Air Index Scheme for Spatial Data Dissemination in Mobile Computing Environments -- 10. Next Generation Location-based Services: Merging Positioning and Web 2.0 -- Part III Mobile Mining -- 11. Data Mining for Moving Object Databases -- 12. Mobile Data Mining on Small Devices Through Web Services -- Part IV Mobile Context-Aware and Applications -- 13. Context Awareness: A Formal Foundation -- 14. Experiences with a Smart Office Project 294 -- 15. An Agent-Based Architecture for Providing Enhanced Communication Services.Part V Mobile Intelligence Security -- 16. MANET Routing Security -- 17. An Online Scheme for Threat Detection Within Mobile Ad Hoc Networks -- 18. SMRTI: Secure Mobile Ad Hoc Network Routing with Trust Intrigue -- 19. Managing Privacy in Location-based Access Control Systems -- Part VI Mobile Multimedia -- 20. VoiceXML-Enabled Intelligent Mobile Services -- 21. User Adaptive Video Retrieval on Mobile Devices -- 22. A Ubiquitous Fashionable Computer with an i-Throw Device on a Location-based Service Environment -- 23. Energy Efficiency for Mobile Multimedia Replay -- Part VII Intelligent Network -- 24. Efficient Data-Centric Storage Mechanisms in Wireless Sensor Networks -- 25. Tracking in Wireless Sensor Networks.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 26. DDoS Attack Modeling and Detection in Wireless Sensor Networks -- 27. Energy-Efficient Pattern Recognition for Wireless Sensor Networks -- Index.
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Restricted to subscribers or individual electronic text purchasers.
520 ## - SUMMARY, ETC.
Summary, etc. Cutting-edge research and application issues on computational intelligence in the mobile environment. The combination of mobile computing and computational intelligence, Mobile Intelligence focuses on learning patterns and knowledge from data generated by mobile users and mobile technology. As a very new area of research, mobile intelligence has created a wide range of opportunities for researchers, engineers, and developers to create new applications for both end users and businesses. Mobile Intelligence covers the comprehensive state-of-the-art in various applications of computational intelligence to the mobile paradigm, including mobile data intelligence, mobile mining, mobile intelligence security, mobile agent, location-based mobile information services, mobile context-aware and applications, intelligent networks, and mobile multimedia. Readers will not only learn different areas of mobile computing and its issues but also various intelligent approaches that contribute in addressing these issues, as well as discover other potential elements in the mobile paradigm.. Explains how to deliver benefits to a wide range of applications, including database query processing, multimedia, commerce systems, e-mail systems, search engines, and Web browsers. Covers efficient and effective mobile data retrieval by various advanced techniques and protocols. Describes intelligent approaches to resolving location-based query processing in the mobile environment. Discusses learning interesting patterns and knowledge out from data generated by mobile users. Investigates the deployment of mobile agents to support context-aware mobile applications. Presents intelligent solutions to the security issues in mobile networks. Evaluates advanced optimization methods for mobile multimedia retrieval. Reveals the latest techniques in solving various issues in wireless sensor network (WSN)Mobile Intelligence is geared for upper-level undergraduate and graduate students in computer science and data mining courses, as well as telecommunication engineers, mobile communication and networking engineers, computer scientists, computer engineers, mobile database specialists, and data mining specialists.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on PDF viewed 12/21/2015.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Mobile computing
General subdivision Research.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computational intelligence
General subdivision Research.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Wireless communication systems
General subdivision Research.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
695 ## -
-- Spread spectrum communication
695 ## -
-- Streaming media
695 ## -
-- Subscriptions
695 ## -
-- Technological innovation
695 ## -
-- Topology
695 ## -
-- Tracking
695 ## -
-- Transform coding
695 ## -
-- Tuning
695 ## -
-- Unified modeling language
695 ## -
-- User interfaces
695 ## -
-- Video codecs
695 ## -
-- Wearable computers
695 ## -
-- Web sites
695 ## -
-- Wireless LAN
695 ## -
-- Wireless communication
695 ## -
-- Wireless networks
695 ## -
-- Wireless sensor networks
695 ## -
-- Zigbee
695 ## -
-- centralized attack detection
695 ## -
-- efficient datacentric storage mechanisms in wireless sensor networks
695 ## -
-- hierarchical management mechanisms
695 ## -
-- intelligent network
695 ## -
-- threshold pattern modeling
695 ## -
-- tracking in WHSNs
695 ## -
-- tracking in wireless sensor networks
695 ## -
-- tracking scenarios in WSNs
695 ## -
-- Access control
695 ## -
-- Accuracy
695 ## -
-- Ad hoc networks
695 ## -
-- Adaptive systems
695 ## -
-- Advertising
695 ## -
-- Approximation algorithms
695 ## -
-- Architecture
695 ## -
-- Arrays
695 ## -
-- Associative memory
695 ## -
-- Base stations
695 ## -
-- Books
695 ## -
-- Buildings
695 ## -
-- Clothing
695 ## -
-- Clustering algorithms
695 ## -
-- Collaboration
695 ## -
-- Communities
695 ## -
-- Companies
695 ## -
-- Compass
695 ## -
-- Computational modeling
695 ## -
-- Computer architecture
695 ## -
-- Computers
695 ## -
-- Connectors
695 ## -
-- Context
695 ## -
-- Context modeling
695 ## -
-- Context-aware services
695 ## -
-- Cooperative caching
695 ## -
-- DDoS attack modeling and detection in wireless sensor networks
695 ## -
-- DVD
695 ## -
-- Data mining
695 ## -
-- Database systems
695 ## -
-- Databases
695 ## -
-- Dictionaries
695 ## -
-- Distributed databases
695 ## -
-- GSM
695 ## -
-- Global Positioning System
695 ## -
-- Handheld computers
695 ## -
-- Hidden Markov models
695 ## -
-- History
695 ## -
-- IEEE 802.11 Standards
695 ## -
-- IEEE 802.16 Standards
695 ## -
-- Indexes
695 ## -
-- Indexing
695 ## -
-- Information retrieval
695 ## -
-- Internet
695 ## -
-- Java
695 ## -
-- Load modeling
695 ## -
-- Markov processes
695 ## -
-- Media
695 ## -
-- Middleware
695 ## -
-- Mobile ad hoc networks
695 ## -
-- Mobile agents
695 ## -
-- Mobile communication
695 ## -
-- Mobile computing
695 ## -
-- Mobile handsets
695 ## -
-- Multiaccess communication
695 ## -
-- Multimedia communication
695 ## -
-- Network topology
695 ## -
-- Neurons
695 ## -
-- Next generation networking
695 ## -
-- Pattern matching
695 ## -
-- Peer to peer computing
695 ## -
-- Performance evaluation
695 ## -
-- Predictive models
695 ## -
-- Privacy
695 ## -
-- Proposals
695 ## -
-- Protocols
695 ## -
-- Quality of service
695 ## -
-- Radiation detectors
695 ## -
-- Recommender systems
695 ## -
-- Routing
695 ## -
-- Routing protocols
695 ## -
-- Sections
695 ## -
-- Security
695 ## -
-- Semantics
695 ## -
-- Sensors
695 ## -
-- Servers
695 ## -
-- Service oriented architecture
695 ## -
-- Software systems
695 ## -
-- Spatial databases
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Yang, Laurence Tianruo.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element IEEE Xplore (Online Service),
Relator term distributor.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element John Wiley & Sons,
Relator term publisher.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Wiley series on parallel and distributed computing ;
Volume/sequential designation 69
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=5732776

No items available.


International Institute of Information Technology, Bangalore
26/C, Electronics City, Hosur Road,Bengaluru-560100 Contact Us
Koha & OPAC at IIITB deployed by Bhargav Sridhar & Team.

Powered by Koha