LEADER 00827nam0-22002891i-450- 001 990005588700403321 005 20080423121049.0 035 $a000558870 035 $aFED01000558870 035 $a(Aleph)000558870FED01 035 $a000558870 100 $a19990604d1952----km-y0itay50------ba 101 0 $aita 105 $aa-------00--- 200 1 $aAcquafortisti veneziani del settecento$fMary Pittaluga 210 $aFirenze$cLe Monnier$d1952 215 $aVII, 208 p.$cill.$d34 cm 610 0 $aAcqueforti$aVenezia$aSec. 18. 676 $a760.0904 700 1$aPittaluga,$bMary$040078 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990005588700403321 952 $a760.09 PIT 1$bST.ARTE 6524$fFLFBC 959 $aFLFBC 996 $aAcquafortisti veneziani del settecento$9608437 997 $aUNINA LEADER 00744nam0-22002651i-450- 001 990003868760403321 035 $a000386876 035 $aFED01000386876 035 $a(Aleph)000386876FED01 035 $a000386876 100 $a19960715d--------km-y0itay50------ba 101 0 $aita 102 $aIT 200 1 $aStrategic pricing and entry deterrence under price cap regulation$fdi Alberto Iozzi 225 1 $aQuaderni CEIS$v130 676 $aI/2.32 700 1$aIozzi,$bAlberto$0127757 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990003868760403321 952 $aPaper$fSES 959 $aSES 996 $aStrategic pricing and entry deterrence under price cap regulation$9514082 997 $aUNINA DB $aING01 LEADER 07491nam 22008175 450 001 9910299234203321 005 20250704083231.0 010 $a3-319-19578-6 024 7 $a10.1007/978-3-319-19578-0 035 $a(CKB)3710000000416876 035 $a(SSID)ssj0001500979 035 $a(PQKBManifestationID)11894726 035 $a(PQKBTitleCode)TC0001500979 035 $a(PQKBWorkID)11521982 035 $a(PQKB)10835543 035 $a(DE-He213)978-3-319-19578-0 035 $a(MiAaPQ)EBC6283562 035 $a(MiAaPQ)EBC5595952 035 $a(Au-PeEL)EBL5595952 035 $a(OCoLC)909881136 035 $a(PPN)186030339 035 $a(EXLCZ)993710000000416876 100 $a20150512d2015 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Science and Its Applications $e5th IFIP TC 5 International Conference, CIIA 2015, Saida, Algeria, May 20-21, 2015, Proceedings /$fedited by Abdelmalek Amine, Ladjel Bellatreche, Zakaria Elberrichi, Erich J. Neuhold, Robert Wrembel 205 $a1st ed. 2015. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2015. 215 $a1 online resource (XXVI, 638 p. 238 illus.) 225 1 $aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v456 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-19577-8 327 $aBinary Bat Algorithm: On the Efficiency of Mapping Functions When Handling Binary Problems Using Continuous-Variable-Based Metaheuristics -- Relative Timed Model for Coordinated Multi Agent Systems -- A Novel Technique for Human Face Recognition Using Fractal Code and Bi-dimensional Subspace -- A New Rotation-Invariant Approach for Texture Analysis -- Multi-CPU/Multi-GPU Based Framework for Multimedia Processing -- Full-Reference Image Quality Assessment Measure Based on Color Distortion -- Biomarker Discovery Based on Large-Scale Feature Selection and MapReduce -- Social Validation of Solutions in the Context of Online Communities: An Expertise-Based Learning Approach -- Remotely Sensed Data Clustering Using K-Harmonic Means Algorithm and Cluster Validity Index -- Comparison of Automatic Seed Generation Methods for Breast Tumor Detection Using Region Growing Technique -- IHBA: An Improved Homogeneity-Based Algorithm for Data Classification -- Multiple Guide Trees in a Tabu Search Algorithm for the Multiple Sequence Alignment Problem -- Noise Robust Features Based on MVA Post-Processing -- Arabic Texts Categorization: Features Selection Based on the Extraction of Words? Roots -- Restoration of Arabic Diacritics Using a Multilevel Statistical Model -- A New Multi-layered Approach for Automatic Text Summaries Mono-Document Based on Social Spiders -- Building Domain Specific Sentiment Lexicons Combining Information from Many Sentiment Lexicons and a Domain Specific Corpus -- Improved Cuckoo Search Algorithm for Document Clustering -- Supporting Legal Requirements in the Design of Public Processes -- Requirement Analysis in Data Warehouses to Support External Information -- Engineering the Requirements of Data Warehouses: A Comparative Study of Goal-Oriented Approaches -- Research and Analysis of the Stream Materialized Aggregate List -- SOLAP On-the-Fly Generalization Approach Based on Spatial Hierarchical Structures -- QoS-Aware Web Services Selection Based on Fuzzy Dominance -- A HybridModel to Improve Filtering Systems -- Towards a Recommendation System for the Learner from a Semantic Model of Knowledge in a Collaborative Environment -- Toward a New Recommender System Based on Multi-criteria Hybrid Information Filtering -- A New Approach for Combining the Similarity Values in Ontology Alignment -- Defining Semantic Relationships to Capitalize Content of Multimedia Resources -- A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques -- On Copulas-Based Classification Method for Intrusion Detection -- On-Off Attacks Mitigation against Trust Systems in Wireless Sensor Networks -- A Real-Time PE-Malware Detection System Based on CHI-Square Test and PE-File Features -- Balanced and Safe Weighted Clustering Algorithm for Mobile Wireless Sensor Networks -- Distributed Algorithm for Coverage and Connectivity in Wireless Sensor Networks -- Optimizing Deployment Cost in Camera-Based Wireless Sensor Networks -- A Version of LEACH Adapted to the Lognormal Shadowing Model -- High Velocity Aware Clocks Synchronization Approach in Vehicular Ad Hoc Networks -- An Energy-Efficient Fault-Tolerant Scheduling Algorithm Based on Variable Data Fragmentation -- Genetic Centralized Dynamic Clustering in Wireless Sensor Networks -- Region-Edge Cooperation for Image Segmentation Using Game Theory -- Improved Parameters Updating Algorithm for the Detection of Moving Objects -- Towards Real-Time Co-authoring of Linked-Data on the Web -- A High Level Net for Modeling and Analysis Reconfigurable Discrete Event Control Systems -- Hybrid Approach for Metamodel and Model Co-evolution -- Extracting and Modeling Design Defects Using Gradual Rules and UML Profile -- An Approach to Integrating Aspects in Agile Development -- On the Optimum Checkpointing Interval Selection for Variable Size Checkpoint Dumps -- Monitoring Checklist for Ceph Object Storage Infrastructure -- Towards a Formalization of Real-Time Patterns-Based Designs. 330 $aThis book constitutes the refereed proceedings of the 5th IFIP TC 5 International Conference on Computer Science and Its Applications, CIIA 2015, held in Saida, Algeria, in May 2015. The 56 revised papers presented were carefully reviewed and selected from 225 submissions. The papers are organized in the following four research tracks: computational intelligence; security and network technology; information technology; and software engineering. 410 0$aIFIP Advances in Information and Communication Technology,$x1868-422X ;$v456 606 $aApplication software 606 $aSoftware engineering 606 $aArtificial intelligence 606 $aComputer networks 606 $aComputational intelligence 606 $aComputer and Information Systems Applications 606 $aSoftware Engineering 606 $aArtificial Intelligence 606 $aComputer Communication Networks 606 $aComputational Intelligence 615 0$aApplication software. 615 0$aSoftware engineering. 615 0$aArtificial intelligence. 615 0$aComputer networks. 615 0$aComputational intelligence. 615 14$aComputer and Information Systems Applications. 615 24$aSoftware Engineering. 615 24$aArtificial Intelligence. 615 24$aComputer Communication Networks. 615 24$aComputational Intelligence. 676 $a005.365 702 $aAmine$b Abdelmalek$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBellatreche$b Ladjel$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aElberrichi$b Zakaria$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNeuhold$b Erich J$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWrembel$b Robert$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299234203321 996 $aComputer Science and its Applications$91412361 997 $aUNINA